Learning about IoT Security and Privacy

A few days ago my book titled “The IoT Architect’s Guide to Attainable Security & Privacy” was released. I had the pleasure of writing it with my friends, David M. Wheeler and JC Wheeler. In the book, we describe how to architect and design IoT (Internet of Things) systems that preserve security and uphold privacy. I’d like to give a brief overview of what we share in the book and what a reader can learn, but before we go into all that… why should you care?

Why Our Book?

Being security architects at Intel, in addition to our combined experiences at McAfee, Honeywell, Motorola, and General Dynamics, our work has afforded us the unique opportunity to be involved in hundreds of diverse IoT and other Internet-related product releases. This has provided us with insights into the future of technologies that are shaping IoT, and insights into the security of IoT and networked systems. It’s given us a knowledge of the security solutions that scale well, the vulnerabilities that are likely to creep into IoT systems, and the assurance practices that significantly reduce risks without overburdening teams. It’s these insights and design practices that put into a book. Your success as an IoT innovator is important to society, so you bet it’s important to us.

What Will You Learn About IoT Security & Privacy?

Here are the topics of our book, at a glance:

  • The fundamental components of an IoT system.
  • The architecture of IoT systems, how they differ from other client-server and cloud-based systems, and why are they architected the way they are.
  • The security-mindset and secure design principles required to build secure systems and communicate effectively with customers, architects, and designers.
  • The motivation and methods of cybercriminals.
  • The IoT Security Economy, dark web, dark money, and digital currency.
  • IoT attack vectors—how IoT systems are attacked.
  • How to perform a threat analysis and construct countermeasures to protect a system, whether that is an IoT, cloud, or some other system—including detailed examples.
  • A broad survey of common and not-so-common IoT communications protocols, and the roles of wired and wireless communications in IoT system.
  • How to perform a protocol analysis—analyzing a communication protocol for security and finding security vulnerabilities in protocols, including a detailed example.
  • Artificial Intelligence and Digital Privacy—the privacy impacts of combining AI and IoT; featuring scenarios for an autonomous vehicle ecosystem and smart refrigerator.
  • Digital privacy laws and regulations and how they impact IoT architectures.
  • A Privacy Playbook to mitigate unnecessary exposure of personal data.
  • Designing Usable IoT Security—principles for building user-friendly security controls into IoT systems.
  • The future evolution of the Internet of Things and AI, the impact on our lives, the security consequences we must prevent . . . starting now, and the responsibilities we all share.

You can find The IoT Architect’s Guide to Attainable Security & Privacy on Amazon. Stay tuned for more insights on IoT solutions, security and privacy!

Subscribe

If you enjoyed this article, you can subscribe to receive our newsletter via email.



Leave a reply:

Your email address will not be published.

Time limit exceeded. Please complete the captcha once again.