0%

Book Description

This book is for everybody that wants to learn a little bit more about how cybersecurity is becoming more relevant in the connected world, both present and future.

As much as companies have increased their awareness about cybersecurity, not all of them are taking effective measures to protect themselves and their customers. Many “smart” things or “IoT” devices get connected every year, allowing the creation of more efficient and even new products and services. However, this also brings new risks, considering also that these type of systems present additional challenges for applying cybersecurity measures. This often leaves many doors open to malicious hackers!

This book explains different ways how these systems get exposed to cyber-attacks in a friendly language using real cases as examples. Business professionals and nontechnical readers can bene t from this book by learning that cybersecurity is not an IT problem but an organizational problem. As a leader and decision maker, having an understanding of IoT cyberrisks can help you to improve the preparedness of your organization to prevent and deal with cyberattacks. Overall this book is for everybody that wants to learn a little bit more about how cybersecurity is becoming more relevant in the connected world, both present and future.

Table of Contents

  1. Cover
  2. Half Title Page
  3. Title Page
  4. Copyright
  5. Contents
  6. Acknowledgments
  7. Chapter 1 Introduction—What Is IoT?
  8. Chapter 2 Real Attack Cases—It Is Not Science Fiction, Smart Things Can Turn against You
  9. Chapter 3 Vulnerability Assessments and Hacking Experiments—The Risk Is There, Just Waiting for a Hacker with Enough Motivation
  10. Chapter 4 Why Is IoT Especially Vulnerable? Requirements and Challenges
  11. Chapter 5 IoT in an Office Environment—Printers, Smart TVs, Routers, and Uninvited Guests
  12. Chapter 6 IoT in an Industrial Environment—Industrial Control Systems and Industry 4.0
  13. Chapter 7 IoT in Utilities and Service Monitoring—Smart Meters and Other Stuff
  14. Chapter 8 Typical Types of Attacks Targeting IoT Systems—Understanding What Can Go Wrong
  15. Chapter 9 Lessons Learned—Getting a Better Idea about How to Handle the Risks
  16. Chapter 10 Conclusions—Now What Do I Do with This Information?
  17. References
  18. About the Author
  19. Index
18.226.150.175