Index
A
- access control hygiene, Policy tools
- access policies, Policy tools
- acknowledgments, Acknowledgments
- AES algorithm, Symmetric Cryptography
- airplanes (see also autonomous vehicles)
- ambiguity, The Somewhat Impossible
- analytics, The Backend
- Anderson, R., Beyond Bits
- anti-patterns
- architectures (see IoT architectures)
- Ashton, Kevin, What’s Different?
- asymmetric cryptography, Public Key Cryptography
- attribute certificates, Public Key Infrastructure, Ontologies of Association
- authentication
- anti-patterns, Anti-Pattern: Authentication Blunders-Moving Forward
- vs. authorization, Authorization
- cryptographic toolkit, newer
- cryptographic toolkit, standard
- default credentials, Instance: Default Credentials
- easy exposure, Instance: Easy Exposure
- improving, Cryptographic Decay
- insufficient, Instance: No Authentication
- IoT challenges
- lack of, Instance: No Authentication
- message authentication codes, Anti-Pattern: Cryptography Blunders
- multifactor, Beyond Bits
- no delegation, Instance: No Delegation
- permanent credentials, Instance: Permanent Credentials
- of physical proximity, Beyond Bits
- authorization, Authorization
- (see also authentication)
- automobiles (see smart cars)
- autonomous vehicles (see also smart cars)
B
- big data/big data analytics, The Backend, When the User Is the Product
- Bitcoin, Blockchains
- blockchains, Blockchains-Blockchains
- Bluetooth networking, Connection to Other Computers
- Border Gateway Protocol (BGP), Addresses and Names
- boundaries in the IoT age, Perception of Boundaries in the IoT Age
- brachytherapy (radioactive seeding), Today
- Brown, Joshua, Today
- brute-force attacks, Symmetric Cryptography
- buffer overflow attacks, Instance: Failure of Input Validation
- Byzantine butterflies/Byzantine hoards, Today
C
- cars (see smart cars)
- certificate revocation list (CRL), Revocation
- certification authority (CA), Instance: Bad PKI, Public Key Infrastructure, Trust roots
- certifigate bug family, Instance: Bad PKI
- chaincode, Blockchains
- closed loop systems, When Law Stops Scrutiny of Technology
- cloud computing, The Backend
- Cloud Security Alliance, The Backend
- coding blunders, Anti-Pattern: Coding Blunders
- cognitive bias, Let the individual decide?, In the Human Mind
- comments and questions, How to Contact Us
- communication protocols, Connection to Other Computers, Who Is That, Really?
- complexity theory, The Somewhat Impossible
- computer systems
- contact information, How to Contact Us
- Controller Area Network (CAN) bus, Instance: No Authentication
- crafted input, Instance: Failure of Input Validation, Instance: Differential Parsing
- credentials
- critical zero-days, Zero-Days and Forever-Days
- cryptocurrency, Blockchains
- cryptography
- aging of, Instance: Aging of Cryptography and Protocols
- asymmetric, Public Key Cryptography
- bad PKI, Instance: Bad PKI
- bad randomness, Instance: Bad Randomness
- common keys, Instance: Common Keys
- computational costs of, The Price Tag
- concept of possible computation, The Standard Cryptographic Toolkit
- cryptographic decay, Cryptographic Decay-Cryptographic Decay
- elliptic curve, The Price Tag
- hashing, Cryptographic Hashing
- privacy issues in, Privacy Side Effects
- protection provided by, Anti-Pattern: Cryptography Blunders
- public key, Public Key Cryptography
- public key infrastructure, Public Key Infrastructure, PKI and Large Populations-IoT scale
- symmetric, Symmetric Cryptography
- cyber Love Canal, Worst-Case Scenarios: Cyber Love Canal
- cyber Pearl Harbor, Worst-Case Scenarios: Cyber Love Canal, Worst-Case Scenarios: Cyber Pearl Harbor
- cyber-physical control
- learning from past mistakes
- potential bugs impacting
D
- data minimization, Looking Forward
- decryption/encryption, Symmetric Cryptography, Public Key Cryptography
- deep learning, The Backend
- default passwords, Instance: Default Credentials, Instance: Permanent Credentials
- DES algorithm, Symmetric Cryptography
- device democracy, Blockchains
- differential parsing, Instance: Differential Parsing
- digital divide
- digital exhaust, The Backend
- digital immigrants vs. natives, Brave New Internet, with Brave New People in It
- Digital Millennium Copyright Act (DMCA), Case Study: The DMCA-Case Study: The DMCA
- digital rights management, Policy tools, When Law Stops Scrutiny of Technology, Mapping, Figuratively
- digital self-service, The IoT Enforcing Preexisting Socioeconomic Divides
- digital signatures, Public Key Infrastructure, Cryptographic Hashing, Constrained Devices and Channels, Cryptographic Decay
- digital ubiquity, Disrupting Business Operations
- DNS Security Extensions (DNSSEC), Addresses and Names
- Domain Name System (DNS), Addresses and Names
- drones, Send in the Drones
E
- electric power grid (see smart grid)
- electromagnetic radiation, Connection to Other Computers
- electronic communication, Who Is That, Really?
- Electronic Frontier Foundation (EFF), Symmetric Cryptography
- elliptic curve cryptography, The Price Tag, Constrained Devices and Channels
- embedded systems, How IoT Systems Differ, Constrained Devices and Channels
- encryption/decryption, Symmetric Cryptography, Public Key Cryptography
- entity authentication, Public Key Cryptography
- envelope protection, The Dawn of Fly-by-Wire
- Ethereum blockchain project, Blockchains
- ethical choices in the IOT age, Ethical Choices in the IoT Age
- evergreen design, Disrupting Business Operations
H
- hash chaining, Blockchains
- hash functions, Cryptographic Hashing, Cryptographic Decay
- Healthcare Information Technology Policy Committee (HITPC), Law and Standards
- HMAC standard, Cryptographic Hashing, Macaroons
- hostnames, Addresses and Names
- human rights, and the digital divide, When IT Is Required to Support Basic Rights-In the Smart City
- human work in the IoT age, Human Work in the IoT Age-Human Work in the IoT Age
- human-machine interconnection, Human/Machine Interconnection in the IoT-Others
I
- identity certificates, Public Key Infrastructure
- IEEE standards, Connection to Other Computers
- impossibility, in computer science, The Somewhat Impossible
- industrial control systems, Infrastructure
- industrial internet, Disrupting Business Operations
- input validation, Anti-Pattern: Doing Too Much
- insurance industry
- integer overflow, Bug Background, The Sad Story
- interface design, Past and Future
- Internet of Computers (IoC)
- access policies, Policy tools
- antitrust arguments in, In History
- bad PKI in, Instance: Bad PKI
- common security blunders, Overcoming Design Patterns for Insecurity
- communication protocols, Connection to Other Computers
- crafted input attacks, Instance: Failure of Input Validation
- cryptography in, Anti-Pattern: Cryptography Blunders, Instance: Aging of Cryptography and Protocols
- design patterns for insecurity, Anti-Pattern: Authentication Blunders
- digital divide in, How Digital Divides Emerged in the IoC, The Digital Divide
- digital rights management in, Mapping, Figuratively
- early attacks on, Preface
- easy exposure during authentication, Instance: Easy Exposure
- effect of big computing on, The Backend
- effect on music industry, Disrupting the Profit Paradigm
- forever-days, Zero-Days and Forever-Days, Anti-Pattern: Coding Blunders
- infrastructure of, Brave New Internet
- insufficient authentication in, Instance: No Authentication
- vs. IoT, The IoT’s Impact on the Physical World, Cryptographic Decay
- ongoing software maintenance, In the IoC
- online shopping, Who Is That, Really?
- penetrate and patch paradigm, Zero-Days and Forever-Days, Anti-Pattern: Coding Blunders
- security issues in, Houses
- web-spoofing pattern, Instance: Easy Exposure
- zero-day blooms, Zero-Days and Forever-Days
- Internet of Things (IoT)
- basic framework for, Examples and Building Blocks
- (see also IoT architectures)
- vs. current internet, What’s Different?-The IoT in the Physical World
- dealing with vulnerabilities in, What Do We Do?
- definitions of, Smart Health IT
- effective software engineering and, Inevitable and Unfortunate Decay-Into the IoT
- expected growth of, Preface, Brave New Internet
- forever-days, Zero-Days and Forever-Days, Anti-Pattern: Coding Blunders
- fundamental truths of, Where to Go Next-What Comes Next
- impact of physical world on, The Physical World’s Impact on the IoT-Jumping Across Boundaries
- impact on physical world, The IoT’s Impact on the Physical World-Medicine
- vs. IoC, The IoT’s Impact on the Physical World, Cryptographic Decay
- malicious attacks in, Worst-Case Scenarios: Cyber Pearl Harbor-Targeted Malicious Attacks in the IoT, Instance: No Authentication, Names and Identity in the IoT-Who Is That, Really?, Blockchains, “Google Moments”?, Things “on the Witness Stand”
- origin of term, What’s Different?
- potential drawbacks of, Worst-Case Scenarios: Cyber Love Canal-Worst-Case Scenarios: Cyber Love Canal
- software maintenance problems, Into the IoT
- zero-day blooms, Zero-Days and Forever-Days
- Internet Protocol (IP), Connection to Other Computers
- intractability, The Somewhat Impossible
- IoT architectures
- IoT technology stack, Disrupting Business Operations
- IoT Trust Framework, Law and Standards
- IPv4 addresses, Addresses and Names
- IPv6 addresses, Connection to Other Computers, Addresses and Names
- ISO9796-1 algorithm, Cryptographic Decay
M
- macaroons, Macaroons
- man-in-the-middle attacks, Instance: Bad PKI
- MD5 hash algorithm, Cryptographic Decay
- medical infrastructure, IoT impact, Medicine
- (see also smart medicine)
- memory corruption, Memory Corruption
- message authentication codes (MACs), Anti-Pattern: Cryptography Blunders, Symmetric Cryptography, Cryptographic Hashing
- mismorphisms, Semiotic Triads, in the 1920s
- Moore's Law, Moore’s Law-How IoT Systems Differ, The Backend
- morphisms, Semiotic Triads, in the 1920s
- Mt. Gox bitcoin exchange, Blockchains
- music industry, Disrupting the Profit Paradigm, Mapping, Figuratively
P
- paradigm disruption, Disrupting the Profit Paradigm
- passwords, default, Instance: Default Credentials, Instance: Permanent Credentials
- Pearl Harbor, cyber, Worst-Case Scenarios: Cyber Love Canal, Worst-Case Scenarios: Cyber Pearl Harbor
- pedestrian detection, In the IoT
- peer review, When Law Stops Scrutiny of Technology
- penetrate and patch paradigm, Zero-Days and Forever-Days, Anti-Pattern: Coding Blunders, Cryptographic Decay
- physical infrastructure
- Pierson, Tim, Beyond Bits
- Portable Instrument for Trace Acquisition (PITA) devices, Large Attack Surface
- privacy issues
- product cloud, Disrupting Business Operations
- programmable logic controllers (PLCs), Targeted Malicious Attacks in the IoT
- Progressive Insurance’s Snapshot devices, Instance: No Authentication
- proof-of-knowledge, Cryptographic Hashing
- proof-of-work mechanism, Blockchains
- public key infrastructure (PKI)
- certificate revocation, Revocation
- components of, Public Key Infrastructure
- computational costs of, Macaroons
- defined, Instance: Bad PKI
- and large populations, PKI and Large Populations-IoT scale
- in online shopping, Who Is That, Really?
- public key generation, Instance: Bad Randomness-Instance: Bad PKI
- scaling issues, IoT scale
- trust paths, Trust paths
- trust roots and, Trust roots
- X.509 public key standards, Public Key Infrastructure, Privacy Side Effects
- public policy, laws, and regulations
- PUFs (physically unclonable functions), PUFs
R
- race conditions, Race Conditions, The Sad Story, Root Causes-Past and Future
- radio-based networking modules, Connection to Other Computers
- reduction, The Somewhat Impossible
- remote driving, Safety
- reproducible results, When Law Stops Scrutiny of Technology
- Resurrection Duckling paper, Beyond Bits
- Richards, C., Semiotic Triads, in the 1920s
- RSA algorithm, Instance: Bad Randomness, Public Key Cryptography, Macaroons, Constrained Devices and Channels
S
- security
- self-driving cars, Traffic, Today, Your Things May Phone Home, License to Self-Drive-License to Self-Drive
- self-signed certificates, Instance: Bad PKI
- semiotic triads, Semiotic Triads, in 2013
- SHA-2 hash function, Cryptographic Hashing
- side-channel analysis, Technological Enforcement
- side-channel attacks, Symmetric Cryptography
- Simon and Speck symmetric ciphers, Constrained Devices and Channels
- smart cars (see also autonomous vehicles)
- smart contracts, Blockchains
- smart grid
- 2003 power failure, Lights Out in 2003
- alternatives to, What Do We Do?
- attack strategies against, Large Attack Surface
- attacks on Ukraine's power grid, Targeted Malicious Attacks in the IoT
- Byzantine hoard occurrences, Today
- critical zero-days, Zero-Days and Forever-Days
- definitions of, Smart Grid
- diagram of, Smart Grid
- generation vs. consumption, The Balancing Act
- improving, Past and Future
- motivation for, The Balancing Act
- race conditions affecting, Root Causes-Past and Future
- software defined radio attacks, Jumping Across Boundaries
- smart health
- authentication and, Beyond Bits
- benefits and drawbacks of, Smart Health IT
- brachytherapy (radioactive seeding), Today
- digital divide and, The IoT Enforcing Preexisting Socioeconomic Divides
- medical smartphone apps, Healthy Entertainment-Healthy Entertainment
- privacy issues, IoC Privacy Spills, Emerging Infrastructure for Spying-Wearables and Health, Let the individual decide?-Let the individual decide?
- ransomware and, Targeted Malicious Attacks in the IoT
- security risks, Medicine, Internet of Big Brother’s Things, Hacking and Business
- software bugs and, Smart medicine
- Therac-25 radiation machine, The Therac-25-The Sad Story
- Varian linear accelerator, Today
- smart home systems
- aggregate data from, In the IoT, In History
- aging in place, How IoT Systems Differ
- authentication and, Names and Identity in the IoT, Beyond Bits, Blockchains
- default passwords and, Instance: Permanent Credentials
- DMCA and, Case Study: The DMCA
- embedded nature of, Brave New Internet, Internet of Big Brother’s Things
- failure of input validation, Instance: Failure of Input Validation-Instance: Failure of Input Validation
- failures of, Houses
- malware-laden emails from, Jumping Across Boundaries
- ontologies of association, Ontologies of Association-Ontologies of Association
- ransomware and, Targeted Malicious Attacks in the IoT
- security issues, Houses
- systematic homogeneity and, Where to Go Next
- societal risks (see also digital divide)
- aggregate data
- business entities and
- of crowdsourced traffic data, Traffic
- personal data breaches, IoC Privacy Spills
- profit and safety
- profit and technological choices
- to physical infrastructure, Infrastructure
- socioeconomic divisions, The IoT Enforcing Preexisting Socioeconomic Divides-The IoT Enforcing Preexisting Socioeconomic Divides
- software defined radio (SDR), Jumping Across Boundaries
- software engineering
- forever-days, Zero-Days and Forever-Days, Anti-Pattern: Coding Blunders
- IoT challenges, Inevitable and Unfortunate Decay-Inevitable and Unfortunate Decay
- penetrate and patch paradigm, Zero-Days and Forever-Days, Anti-Pattern: Coding Blunders, Cryptographic Decay
- software components, Zero-Days and Forever-Days
- software maintenance, The Fix is In?-Into the IoT, Who Is That, Really?
- Stajano, F., Beyond Bits
- stepper motors, Connection to the Physical World
- Stuxnet malware, Targeted Malicious Attacks in the IoT, Instance: Default Credentials
- symmetric cryptography, Symmetric Cryptography
- systems on modules, Architectures for an IoT
T
- technology stack, Disrupting Business Operations
- Telematics Gateway Units, Instance: No Authentication
- Tesla self-driving cars, Today, Your Things May Phone Home
- Therac-25 radiation machine, The Therac-25-The Sad Story
- trust paths, Trust paths
- trust roots, Public Key Infrastructure, Trust roots
- Turner, C., The Sad Story
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.