Demystifying Internet of Things Security

Lieferzeit: Lieferbar innerhalb 14 Tagen

40,65 

Successful IoT Device/Edge and Platform Security Deployment

ISBN: 1484228952
ISBN 13: 9781484228951
Verlag: APress
Umfang: xxx, 488 S., 18 s/w Illustr., 134 farbige Illustr., 488 p. 152 illus., 134 illus. in color.
Erscheinungsdatum: 14.08.2019
Weitere Autoren: Cheruvu, Sunil/Kumar, Anil/Smith, Ned et al
Auflage: 1/2019
Produktform: Kartoniert
Einband: Kartoniert

The Internet of Things presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. According to a report issued at the Trillion Sensors Summit, held in October 2014 at Stanford University, the number of connected machines and devices will be about 1 trillion by the year 2022. The majority of the IoT community is attempting to connect the billions of devices together. The challenge is to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Who This Book Is for:Demystifying Internet of Things Security is targeted to readers in the strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms. What You Will Learn:From this book, readers will gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms. Readers will also be able to understand the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. This book is open access under a CC BY license.

Artikelnummer: 3101161 Kategorie:

Beschreibung

Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defenseindepth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms.

Autorenporträt

Sunil Cheruvu is a Principal Engineer in the Platform Engineering Division of IOTG at Intel Corporation and has been involved in architecting complex systems involving HW/FW/SW for almost 23 years. Implementing the code for Baseline Privacy security in DOCSIS compliant Cable Modems when he was a Senior SW Engineer at 3com and a SW Staff Engineer at Conexant. Working at Microsoft as a SW Design Engineer, he was the tech lead for Vehicle Networking involving the Bus and Protocol driver stacks. He took the stacks through the threat modeling and implemented the resolutions in what was released as the Windows Mobile for Automotive (WMfA) platform. At Intel, he was the Content Protection lead and owned the system level architecture of Conditional Access and Trusted Data Path (end-2-end premium content protection within a SoC.) Architecting the security for embedded devices and in his current role as the Principal Engineer, owns the scaling of security (from below Atom to Xeon) and on multiple Operating Systems. He is the subject matter expert for IOTG security across Intel and outside of Intel. Anil Kumar is a Principal Engineer in the Platform Engineering Division of IOTG at Intel Corporation, and is responsible for the Connectivity Platform Architecture across IOTG. In this role, he leads the effort with the planning team to create IOTG's first ever roadmap for connectivity solutions. He is currently driving platform and chip level integration of several key connectivity and communication technologies which are critical for Cyber Physical Systems. Anil joined Intel in 2007 as a design engineer in Digital Home Group. He served as Platform Architect for several Intel Architecture based Media Processors for TV and Set Top Box applications. As the chief architect in Intel Media Group Anil lead several designs that resulted in award winning consumer electronic device designs at CES. The world's first Google TV devices were based on reference design efforts lead by Anil as well. Prior to joining Intel, Anil held design engineering positions at multinational companies such as Fujitsu & Alcatel. He was instrumental in taking several designs from concept to production throughout his career. Ned Smith is a Principal Engineer in the Open Technology Center (OTC) team in the Software Solutions Group at Intel Corporation. He is responsible for defining Internet of Things security architecture and standards for open IoT technologies. This includes defining IoT architecture for Open Connectivity Foundation (OCF) and IPSO Alliance. Ned chairs the Security, Privacy and Identity (SPI) work group in IPSO Alliance. He is co-author of the Internet Engineering Task Force (IETF) draft specification, draft-hardjono-ace-fluffy-03 that defines key management for constrained environments. Ned joined Intel Labs in 1995 where he helped define the Common Data Security Architecture (CDSA) that was standardized by the Open Group. He chaired the Infrastructure Workgroup (IWG) in the Trusted Computing Group (TCG) from its inception until 2006. The IWG may best be known for its work on Network Access Control (NAC) standards that later became the Trusted Network Connect (TNC) working group within the TCG. The TNC standards were adopted by a majority of network security vendors supplying NAC products. Ned has been highly influential within Intel having contributed to a long list of enterprise and office security technologies including Intel Identity Protection Technology, Intel Anti-theft Technology, Intel Manageability Engine, Intel Converged Security Engine, Intel Trusted Execution Technology, Intel Insider, Intel Virtualization Technology, Intel Deep Defender, Intel Platform Trust Technology, Intel Software Guard Extensions and numerous other security, privacy, ident

Herstellerkennzeichnung:


APress in Springer Science + Business Media
Heidelberger Platz 3
14197 Berlin
DE

E-Mail: juergen.hartmann@springer.com

Das könnte Ihnen auch gefallen …