Skip to main content

2018 | OriginalPaper | Buchkapitel

28. Securing the Internet of Things: Best Practices for Deploying IoT Devices

verfasst von : Bryson R. Payne, Tamirat T. Abegaz

Erschienen in: Computer and Network Security Essentials

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Internet of Things (IoT) has brought a wealth of new technologies both in homes and businesses onto IP networks not natively designed to securely support such myriad devices. Networks once hosting only computers and printers now routinely contain payment systems, Wi-Fi and mobile/wearable devices, VoIP phones, vending machines, sensor and alarm systems, servers, security cameras, thermostats, door locks and other building controls, just to name a few. This chapter analyzes current best practices for securing computer networks with special attention to IoT challenges, discusses selected major IoT security incidents, details selected IoT cyber attacks as proofs of concept, and presents a framework for securely deploying IoT devices in the enterprise and at home.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
8.
Zurück zum Zitat Greene, C., Stavins, J. (2016). Did the target data breach change consumer assessments of payment card security? (Research Data Reports No. 16-1). Federal Reserve Bank of Boston. Greene, C., Stavins, J. (2016). Did the target data breach change consumer assessments of payment card security? (Research Data Reports No. 16-1). Federal Reserve Bank of Boston.
16.
Zurück zum Zitat Nichols, O., Yang, L., & Yuan, X. (2016, October 4). Teaching security of internet of things in using raspberry Pi. In KSU conference on cybersecurity education, research and practice. Nichols, O., Yang, L., & Yuan, X. (2016, October 4). Teaching security of internet of things in using raspberry Pi. In KSU conference on cybersecurity education, research and practice.
17.
Zurück zum Zitat O’Harrow, Jr. R. (2012, June 3). Cyber search engine Shodan exposes industrial control systems to new risks. The Washington Post, 6. O’Harrow, Jr. R. (2012, June 3). Cyber search engine Shodan exposes industrial control systems to new risks. The Washington Post, 6.
21.
Zurück zum Zitat Shields, K. (2015). Cybersecurity: Recognizing the risk and protecting against attacks. North Carolina Banking Institute, 19, 345. Shields, K. (2015). Cybersecurity: Recognizing the risk and protecting against attacks. North Carolina Banking Institute, 19, 345.
22.
Zurück zum Zitat Simon, K. (2016, November 14). Vulnerability analysis using google and shodan. In International conference on cryptology and network security (pp. 725–730). Springer International Publishing. Simon, K. (2016, November 14). Vulnerability analysis using google and shodan. In International conference on cryptology and network security (pp. 725–730). Springer International Publishing.
23.
Zurück zum Zitat Slay, J., & Miller, M. (2007, March 19). Lessons learned from the maroochy water breach. In Conference on critical infrastructure protection (pp. 73–82). New York: Springer. Slay, J., & Miller, M. (2007, March 19). Lessons learned from the maroochy water breach. In Conference on critical infrastructure protection (pp. 73–82). New York: Springer.
26.
Zurück zum Zitat Wheatley, S., Maillart, T., & Sornette, D. (2016). The extreme risk of personal data breaches and the erosion of privacy. The European Physical Journal B, 89, 1–2.CrossRef Wheatley, S., Maillart, T., & Sornette, D. (2016). The extreme risk of personal data breaches and the erosion of privacy. The European Physical Journal B, 89, 1–2.CrossRef
Metadaten
Titel
Securing the Internet of Things: Best Practices for Deploying IoT Devices
verfasst von
Bryson R. Payne
Tamirat T. Abegaz
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-58424-9_28

Neuer Inhalt