In this ebook we outline a set of practical and pragmatic cyber security considerations for organisations designing, developing and, testing Internet of Things (IoT) devices and solutions. The purpose is to provide practical advice for consideration as part of the product development life-cycle from concept to after market support.
While IoT products by their very nature encompass many forms of traditional embedded devices and supporting systems, we felt that distilling our knowledge and experience in the specific context of IoT would be useful. A lot of the concepts in this eBook could easily be applied to many other related areas of software and hardware product development.
We start by looking at why security and privacy matters in the context IoT from both a emerging regulatory perspective as well as purchaser expectations. We then delve into subjects such as secure hardware versus open hardware, the IoT cyber-security threat landscape and practical threat modelling.
A significant proportion of the book is taken up with walking the reader through the product life-cycle showing where, how and what in relation to cyber-security should be considered. From concept design, market analysis, competitive analysis and research all the way through to after market product security sustainment and maintenance. We provide practical examples and steps of how and why cyber-security can be cost effectively considered whilst drawing out real-word examples of when it goes wrong.
This eBook is aimed at CTOs, product managers, architects, developers and quality assurance engineers as well as cyber-security & risk professionals.
While IoT products by their very nature encompass many forms of traditional embedded devices and supporting systems, we felt that distilling our knowledge and experience in the specific context of IoT would be useful. A lot of the concepts in this eBook could easily be applied to many other related areas of software and hardware product development.
We start by looking at why security and privacy matters in the context IoT from both a emerging regulatory perspective as well as purchaser expectations. We then delve into subjects such as secure hardware versus open hardware, the IoT cyber-security threat landscape and practical threat modelling.
A significant proportion of the book is taken up with walking the reader through the product life-cycle showing where, how and what in relation to cyber-security should be considered. From concept design, market analysis, competitive analysis and research all the way through to after market product security sustainment and maintenance. We provide practical examples and steps of how and why cyber-security can be cost effectively considered whilst drawing out real-word examples of when it goes wrong.
This eBook is aimed at CTOs, product managers, architects, developers and quality assurance engineers as well as cyber-security & risk professionals.