Description
This book is an exploration of the best strategies for implementation of IoT security. As IoT is a new technology, not much has been done to determine the best and final solution to IoT security challenges. However, this book guides you on the best mechanisms for ensuring that your IoT systems are kept secure. The threats to IoT security in most organizations are discussed. You are then guided on how to deal with each of these challenges. You will also learn the constraints which you have to adhere to whenever you are implementing IoT security. API management is one of the key approaches to implementation and ensuring that there is IoT security. This book guides you on the best strategies for management of APIs so as to ensure that the IoT systems are well secured. Authentication of the electronic devices used in IoT is also a good mechanism for the implementation of IoT security. This is explored in detail. Secure boot, which forms the root of trust in IoT security is also examined in this book. Public key cryptography, which is good for encryption of data in transit, is also discussed. The following topics are explored in this book: - A Brief Overview of IoT Security - Threats, Challenges, and Constraints in IoT Security - APIs in IoT - Authentication in IOT - Best Strategy for Securing IoT - Secure Boot - Public Key Cryptography
Author: David Etter
Publisher: Createspace Independent Publishing Platform
Published: 12/01/2016
Pages: 64
Binding Type: Paperback
Weight: 0.22lbs
Size: 9.02h x 5.98w x 0.13d
ISBN13: 9781540335012
ISBN10: 1540335011
BISAC Categories:
- Computers | General
Author: David Etter
Publisher: Createspace Independent Publishing Platform
Published: 12/01/2016
Pages: 64
Binding Type: Paperback
Weight: 0.22lbs
Size: 9.02h x 5.98w x 0.13d
ISBN13: 9781540335012
ISBN10: 1540335011
BISAC Categories:
- Computers | General
This title is not returnable