1007321.pdf

Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The Io...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Γλώσσα:English
Έκδοση: Springer Nature 2020
Διαθέσιμο Online:https://www.springer.com/9781484228968
id oapen-20.500.12657-22840
record_format dspace
spelling oapen-20.500.12657-228402024-03-22T19:23:32Z Demystifying Internet of Things Security Cheruvu, Sunil Kumar, Anil Smith, Ned Wheeler, David M. Computer science Computer communication systems Computer security Information technology Business—Data processing thema EDItEUR::K Economics, Finance, Business and Management::KJ Business and Management::KJQ Business mathematics and systems thema EDItEUR::U Computing and Information Technology::UK Computer hardware::UKN Network hardware thema EDItEUR::U Computing and Information Technology::UR Computer security Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms. 2020-03-18 13:36:15 2020-04-01T08:53:35Z 2020-04-01T08:53:35Z 2020 book 1007321 http://library.oapen.org/handle/20.500.12657/22840 eng application/pdf n/a 1007321.pdf https://www.springer.com/9781484228968 Springer Nature 10.1007/978-1-4842-2896-8 10.1007/978-1-4842-2896-8 6c6992af-b843-4f46-859c-f6e9998e40d5 488 Berkeley, CA open access
institution OAPEN
collection DSpace
language English
description Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms.
title 1007321.pdf
spellingShingle 1007321.pdf
title_short 1007321.pdf
title_full 1007321.pdf
title_fullStr 1007321.pdf
title_full_unstemmed 1007321.pdf
title_sort 1007321.pdf
publisher Springer Nature
publishDate 2020
url https://www.springer.com/9781484228968
_version_ 1799945309837590528