ANACOM

!    
TÍTULO/RESP.:

IoT security [documento eletrónico] : technology strategies and vendor profiles

: the security capabilities needed to protect the internet of things / Rik Turner

AUTOR(ES):

TURNER, Rik

PUBLICAÇÃO:

London: Ovum, 2017

NOTAS:

"The Internet of Things (IoT) is a rapidly expanding part of the global information economy, yet security exploits such as last year's Dyn attack by the Mirai botnet show that more attention needs to be paid to making the IoT safe. With this burgeoning world of hyperconnectivity taking shape before our eyes, this report looks at the technologies needed to provide IoT security and some of the vendors providing them. Companies deploying IoT infrastructure, whether for their own use or to provide IoT services, as well as the manufacturers of IoT devices, should look to build in security from day one. This report will help crystallize thinking about which technologies are required and which vendors to go to for them. It focuses primarily on security issues and solutions for the Industrial Internet of Things (IIoT), with some thoughts and comments about other markets such as consumer IoT (connected home) and automotive IoT (connected car).As this report will demonstrate, there are similarities between the types of security technologies required for the IoT and those used in conventional IT security. Both worlds need technology to keep threat actors and malicious code out of the environment and valuable information in, herein referred to as "edge security." Equally, both need systems in place to control what users and devices that are authorized to access the environment can and cannot see, herein referred to as "core security." Finally, if all else fails and data is stolen, both need technology that renders stolen data useless by obfuscating it, herein referred to as "data security." But although these similarities exist, causing vendors of IT security to think that they can expand into the burgeoning market of IoT security, there are a number of important ways in which IoT security differs from conventional IT security, from its massive scale to its need for longevity in the field."

TEMA:

Comunicações Eletrónicas

ASSUNTOS:

Comunicações eletrónicasTelecomunicaçõesInternetSegurançaIoTDados pessoais

CDU:

004

DATA PUB.:

2017

TipoReg:

Multimédia

LÍNGUA:

ENG

Monografias