RIoT Control

1st Edition

Understanding and Managing Risks and the Internet of Things

Authors: Tyson Macaulay
Paperback ISBN: 9780124199712
eBook ISBN: 9780124199903
Imprint: Morgan Kaufmann
Published Date: 15th September 2016
Page Count: 404
64.50 + applicable tax
42.95 + applicable tax
36.99 + applicable tax
59.95 + applicable tax
Unavailable
Compatible Not compatible
VitalSource PC, Mac, iPhone & iPad Amazon Kindle eReader
ePub & PDF Apple & PC desktop. Mobile devices (Apple & Android) Amazon Kindle eReader
Mobi Amazon Kindle eReader Anything else

Institutional Access


Description

RIoT Control: Understanding and Managing Risks and the Internet of Things explains IoT risk in terms of project requirements, business needs, and system designs. Learn how the Internet of Things (IoT) is different from “Regular” Enterprise security, more intricate and more complex to understand and manage. Billions of internet-connected devices make for a chaotic system, prone to unexpected behaviors. Industries considering IoT technologies need guidance on IoT-ready security and risk management practices to ensure key management objectives like Financial and Market success, and Regulatory compliance. Understand the threats and vulnerabilities of the IoT, including endpoints, newly emerged forms of gateway, network connectivity, and cloud-based data centers. Gain insights as to which emerging techniques are best according to your specific IoT system, its risks, and organizational needs. After a thorough introduction to the Iot, Riot Control explores dozens of IoT-specific risk management requirements, examines IoT-specific threats and finally provides risk management recommendations which are intended as applicable to a wide range of use-cases.

Key Features

  • Explains sources of risk across IoT architectures and performance metrics at the enterprise level
  • Understands risk and security concerns in the next-generation of connected devices beyond computers and mobile consumer devices to everyday objects, tools, and devices
  • Offers insight from industry insiders about emerging tools and techniques for real-world IoT systems

Readership

IT architects or operational decision-makers and managers tasked with specifying or designing IoT systems

Table of Contents

  • Comments From Reviewers
  • Preface
  • Chapter 1. Introduction—The Internet of Things

    • Abstract
    • You Are Never Too Young to Start Good Habits
    • What Is the IoT?
    • Audience
    • How This Book Flows
    • What Is the IoT?
    • The “Old” Internet of Data, Voice, and Video
    • The Internet ++
    • Who Are the Major Players in the IoT?
    • Why Do They Care? Stakeholders From a Different Angle
    • Conclusion
  • Chapter 2. The Anatomy of the Internet of Things

    • Abstract
    • When Does the IoT Actually Get Here?
    • IPv4 Does Not Do IoT Any Favors
    • IoT Is Enabled by IPv6
    • The Architectural Framework of the IoT: Endpoints, Gateways, Networks, and DCs/Clouds
    • Endpoint Asset Class in the IoT
    • Gateway Asset Class in the IoT
    • Network Asset Class in the IoT
    • Cloud and Data Center as an Asset Class
    • Conclusions
  • Chapter 3. Requirements and Risk Management

    • Abstract
    • A Parable for Requirements and Risk Management
    • Introduction
    • Audience
    • Framing the Discussion
    • What Are Security Requirements?
    • Translation, Please! Organizational and Business Process Requirements in Plain(er) Language
    • Really—Who Wants to Know All This Requirements Stuff?!
    • Risk, Requirements, and Deliverables
    • Technical Requirements: This Is Where We Draw the Line
    • Applications and Services Composing the IoT
    • Industry Use Cases, Efficiencies, and Satisfaction
    • Summary
  • Chapter 4. Business and Organizational Requirements

    • Abstract
    • Parable for Business and Organizational Requirements
    • Introduction
    • Audience
    • Business and Organizational Requirements in the IoT
    • Regulatory and Legal Requirements
    • Financial Requirements
    • <li

Details

No. of pages:
404
Language:
English
Copyright:
© Morgan Kaufmann 2017
Published:
Imprint:
Morgan Kaufmann
eBook ISBN:
9780124199903
Paperback ISBN:
9780124199712

About the Author

Tyson Macaulay

Tyson Macaulay is a Chief Technology Officer and Chief Security Strategist with over 20 years in the security industry and experience at firms such as Fortinet, Intel and Bell Canada. Tyson is also a researcher with lectureship, books, periodical publications and patents dating from 1993. Tyson supports the development of engineering and security standards through the International Standards Organization (ISO), and Professional Engineers of Ontario. Specialties: Telecom-grade security design, Enterprise Risk Management, Technical Risk Management, Security Architecture, Security Methodology, Security Audit and Compliance, Security program development and Governance, International Standards development, Internet of Things (IoT), International Security Standards.

Affiliations and Expertise

CISSP, CISA, Sunnyvale, CA, USA