1st Edition

The IoT Architect's Guide to Attainable Security and Privacy

    330 Pages
    by Auerbach Publications

    330 Pages
    by Auerbach Publications

    This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the loT-security economy. It's both informative and entertaining.



    "Filled with practical and relevant examples based on years of experience ... with lively discussions and storytelling related to loT security design flaws and architectural issues."— Dr. James F. Ransome, Senior Director of Security Development Lifecycle (SOL) Engineering, Intel



    'There is an absolute treasure trove of information within this book that will benefit anyone, not just the engineering community. This book has earned a permanent spot on my office bookshelf."— Erv Comer, Fellow of Engineering, Office of Chief Architect Zebra Technologies



    'The importance of this work goes well beyond the engineer and architect. The IoT Architect's Guide to Attainable Security & Privacy is a crucial resource for every executive who delivers connected products to the market or uses connected products to run their business."— Kurt Lee, VP Sales and Strategic Alliances at PWNIE Express



    "If we collectively fail to follow the advice described here regarding loT security and Privacy, we will continue to add to our mounting pile of exploitable computing devices. The attackers are having a field day. Read this book, now."— Brook S.E. Schoenfield, Director of Advisory Services at IOActive, previously Master Security Architect at McAfee, and author of Securing Systems



    Dedication



    Contents



    Foreword by Dr. James Ransome



    Foreword by Erv Comer



    Preface



    Acknowledgments



    About the Authors





    Part One



    Chapter 1 How We Got Here



    Damilare Fagbemi, Dave Wheeler, and JC Wheeler





    Chapter 2 The IoT Castle and Its Many Gates



    Damilare Fagbemi and Dave Wheeler





    Chapter 3 The IoT Security Economy



    Damilare Fagbemi and Dave Wheeler





    Part Two



    Chapter 4 Architecting IoT Systems That Scale Securely



    Dave Wheeler





    Chapter 5 Security Architecture for Real IoT Systems



    Dave Wheeler





    Chapter 6 Securing the IoT Cloud



    Damilare Fagbemi





    Chapter 7 Securely Connecting the Unconnected



    Dave Wheeler





    Chapter 8 Privacy, Pirates, and the Tale of a Smart City



    JC Wheeler





    Chapter 9 Privacy Controls in an Age of Ultra-Connectedness



    Dave Wheeler and Damilare Fagbemi





    Chapter 10 Security Usability: Human, Computer, and Security Interaction



    Damilare Fagbemi





    Part Three



    Chapter 11 Earth 2040—Peeking at the Future



    Damilare Fagbemi





    Epilogue



    Index

    Biography

    Damilare D. Fagbemi, David Wheeler, JC Wheeler