語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cyber Threat Intelligence for the In...
~
Bou-Harb, Elias.
Cyber Threat Intelligence for the Internet of Things
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Cyber Threat Intelligence for the Internet of Things/ by Elias Bou-Harb, Nataliia Neshenko.
作者:
Bou-Harb, Elias.
其他作者:
Neshenko, Nataliia.
面頁冊數:
X, 89 p. 42 illus., 26 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Information Systems Applications (incl. Internet). -
電子資源:
https://doi.org/10.1007/978-3-030-45858-4
ISBN:
9783030458584
Cyber Threat Intelligence for the Internet of Things
Bou-Harb, Elias.
Cyber Threat Intelligence for the Internet of Things
[electronic resource] /by Elias Bou-Harb, Nataliia Neshenko. - 1st ed. 2020. - X, 89 p. 42 illus., 26 illus. in color.online resource.
Introduction -- Taxonomy of IoT Vulnerabilities -- Towards Inferring IoT Maliciousness -- Generating and sharing IoT-centric Cyber Threat Intelligence -- Concluding Remarks and Future Perspective.-.
This book reviews IoT-centric vulnerabilities from a multidimensional perspective by elaborating on IoT attack vectors, their impacts on well-known security objectives, attacks which exploit such vulnerabilities, coupled with their corresponding remediation methodologies. This book further highlights the severity of the IoT problem at large, through disclosing incidents of Internet-scale IoT exploitations, while putting forward a preliminary prototype and associated results to aid in the IoT mitigation objective. Moreover, this book summarizes and discloses findings, inferences, and open challenges to inspire future research addressing theoretical and empirical aspects related to the imperative topic of IoT security. At least 20 billion devices will be connected to the Internet in the next few years. Many of these devices transmit critical and sensitive system and personal data in real-time. Collectively known as “the Internet of Things” (IoT), this market represents a $267 billion per year industry. As valuable as this market is, security spending on the sector barely breaks 1%. Indeed, while IoT vendors continue to push more IoT devices to market, the security of these devices has often fallen in priority, making them easier to exploit. This drastically threatens the privacy of the consumers and the safety of mission-critical systems. This book is intended for cybersecurity researchers and advanced-level students in computer science. Developers and operators working in this field, who are eager to comprehend the vulnerabilities of the Internet of Things (IoT) paradigm and understand the severity of accompanied security issues will also be interested in this book.
ISBN: 9783030458584
Standard No.: 10.1007/978-3-030-45858-4doiSubjects--Topical Terms:
881699
Information Systems Applications (incl. Internet).
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Cyber Threat Intelligence for the Internet of Things
LDR
:03250nam a22003975i 4500
001
1017361
003
DE-He213
005
20200702042317.0
007
cr nn 008mamaa
008
210318s2020 gw | s |||| 0|eng d
020
$a
9783030458584
$9
978-3-030-45858-4
024
7
$a
10.1007/978-3-030-45858-4
$2
doi
035
$a
978-3-030-45858-4
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Bou-Harb, Elias.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1312146
245
1 0
$a
Cyber Threat Intelligence for the Internet of Things
$h
[electronic resource] /
$c
by Elias Bou-Harb, Nataliia Neshenko.
250
$a
1st ed. 2020.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
X, 89 p. 42 illus., 26 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Introduction -- Taxonomy of IoT Vulnerabilities -- Towards Inferring IoT Maliciousness -- Generating and sharing IoT-centric Cyber Threat Intelligence -- Concluding Remarks and Future Perspective.-.
520
$a
This book reviews IoT-centric vulnerabilities from a multidimensional perspective by elaborating on IoT attack vectors, their impacts on well-known security objectives, attacks which exploit such vulnerabilities, coupled with their corresponding remediation methodologies. This book further highlights the severity of the IoT problem at large, through disclosing incidents of Internet-scale IoT exploitations, while putting forward a preliminary prototype and associated results to aid in the IoT mitigation objective. Moreover, this book summarizes and discloses findings, inferences, and open challenges to inspire future research addressing theoretical and empirical aspects related to the imperative topic of IoT security. At least 20 billion devices will be connected to the Internet in the next few years. Many of these devices transmit critical and sensitive system and personal data in real-time. Collectively known as “the Internet of Things” (IoT), this market represents a $267 billion per year industry. As valuable as this market is, security spending on the sector barely breaks 1%. Indeed, while IoT vendors continue to push more IoT devices to market, the security of these devices has often fallen in priority, making them easier to exploit. This drastically threatens the privacy of the consumers and the safety of mission-critical systems. This book is intended for cybersecurity researchers and advanced-level students in computer science. Developers and operators working in this field, who are eager to comprehend the vulnerabilities of the Internet of Things (IoT) paradigm and understand the severity of accompanied security issues will also be interested in this book.
650
2 4
$a
Information Systems Applications (incl. Internet).
$3
881699
650
2 4
$a
Artificial Intelligence.
$3
646849
650
2 4
$a
Computer Communication Networks.
$3
669310
650
1 4
$a
Security.
$3
1114130
650
0
$a
Application software.
$3
528147
650
0
$a
Artificial intelligence.
$3
559380
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Data protection.
$3
557764
700
1
$a
Neshenko, Nataliia.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1312147
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030458577
776
0 8
$i
Printed edition:
$z
9783030458591
776
0 8
$i
Printed edition:
$z
9783030458607
856
4 0
$u
https://doi.org/10.1007/978-3-030-45858-4
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入