Holistic View
on IoT Security
Chapter
12
CYBER SECURITY
The objective of the Internet of Things is to develop a digital and physical infrastructure where
automobiles, smartphones, appliances, and other devices are continuously connected. With
constant communication of connected devices, shortcomings are easily identified and a greater
perspective is achieved which could help to turn around the IoT infrastructure. Additionally,
this is a strong source for the collection of data, through which companies can monitor their
devices 24/7 and assess its operational eciency.
Internet of Things helps to become more synchronized with the internet. Rather, than using
a stationary machine or a single screen to access the internet, now you can instead let internet
monitor your complete life. Ideally, this can help you achieve unprecedented levels of produc-
tivity, unfortunately, the reality is bitter. What this means is that you also have to think about
the security aspect like how internet access can aect your personal and digital security. With
multiple access points, IoT devices have a higher likelihood to get entangled in a cyber attack.
For combating hacking, cyber security uses modern solutions like AI and machine
learning. Soon, the IT departments of the companies will need to use their detailed knowledge
about cyber security trends. With the expansion of opportunities, it will be left to cyber
security professionals to incorporate the right cybersecurity solutions which can thwart o
any major hacking attempt. There is a wide range of cyber security applications in the Internet
of Things ecosystem. IoT systems which are used by millions of users can be brought down
by well co-coordinated unified attacks. While there is no doubt about the positive impact of
the Internet of Things in our future lives, at the same time it is hard to debunk several of its
concerns, thus leverage the best of your capabilities and remain vigilant.
After completing this chapter, you will be able to:
Learn about cybersecurity
Learn about physical and hardware security
Learn about cryptography
Learn about blockchain and its role in IoT
Learn management of identity for devices, and
Learn about best security practices.
LEARNING OBJECTIVES
Internet_of_Things_CH12_pp309-326.indd 309 9/3/2019 10:16:42 AM
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.118.200.197