2

Royal Holloway: Attack mapping for the internet of things

 2 years ago
source link: https://www.computerweekly.com/ehandbook/Headline-Royal-Holloway-Attack-mapping-for-the-internet-of-things
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

CW+ Premium Content/E-Handbooks

May 2022

Headline: Royal Holloway: Attack mapping for the internet of things

RH-2022-07-William-Bathgate-cover-252px.jpg

With the introduction of each internet of things (IoT) device to a home network increasing the attack surface and risks of a security threat, this article in our Royal Holloway security series puts forward a practical model for investigating the security of a home network to evaluate and track what pathways an attacker may use to compromise it. The model allows an individual to understand the attacks, evaluate whether the attack is feasible within the context of a specific network, and finally action it, reducing the risk.

Table Of Contents

  • The internet of things (IoT) has been adopted by a range of domains, including the industrial sector (which covers the smart grid, transport and logistics, factories and production, retail and consumer, healthcare), as well as the connected home and smart cities.
  • By 2024, the total number of IoT connections will reach 83 billion.
  • With the introduction of each internet-connected device in a home network the attack surface and risks of a security threat increase.
  • With remote working widespread, home networks that were once used only for personal reasons are now transmitting sensitive business-related data, making individuals and home networks a valued target of cyber criminals.
  • This article proposes an IoT smart home attack map that allows an individual to evaluate the security of a network and reduce risks.

Access this CW+ Content for Free!

Already a member? Login here

    • I agree to TechTarget’s Terms of Use, Privacy Policy, and the transfer of my information to the United States for processing to provide me with relevant information as described in our Privacy Policy.
    • I agree to my information being processed by TechTarget and its Partners to contact me via phone, email, or other means regarding information relevant to my professional interests. I may unsubscribe at any time.

About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK