Introduction
Securing the IoT
()
What you should know
()
1. Overview
Security, privacy, and IoT
()
Internet of Things
()
Security
()
Privacy
()
Massive adoption
()
2. Potential Attacks and Glitches
Attacks and glitches
()
DDoS
()
Denial-of-sleep attacks
()
IoT worms
()
Voice and sound attacks
()
3. Vulnerabilities
IoT vulnerabilities
()
No malware needed
()
Vendor backdoors
()
Glitches and compatibility issues
()
Army of Things
()
4. Privacy
Privacy concerns
()
Spying
()
Data collection
()
Independent devices
()
Government
()
Challenge: Understanding IoT vulnerabilities
()
Solution: Understanding IoT vulnerabilities
()
5. Existing Standards and Regulations
Standards, regulations, and guidelines
()
PCI DSS
()
HIPAA
()
COBIT
()
Sarbanes-Oxley
()
6. Proposed Standards and Legislation
Need for standards
()
Security legislation
()
Discovering the IoT security foundation
()
Using resources on NIST and OWASP
()
IoT protocols
()
Common IoT language
()
7. Securing IoT Devices
Firewalls and IDS
()
Defending against IoT malware
()
Blockchains and Physical Unclonable Functions (PUF)
()
Education and awareness
()