What this book covers
Chapter 1, A Brave New World, introduces you to the basics of IoT, its definition, uses, applications, and its implementations.
Chapter 2, Vulnerabilities, Attacks, and Countermeasures, takes you on a tour where you will learn about the various threats and the measures that we can take to counter them.
Chapter 3, Security Engineering for IoT Development, teaches you about the various phases of the IoT security lifecycle.
Chapter 4, The IoT Security Lifecycle, explores the operational aspects of the IoT security lifecycle in detail.
Chapter 5, Cryptographic Fundamentals for IoT Security Engineering, provides a background on applied cryptography.
Chapter 6, Identity and Access Management Solutions for the IoT, dives deep into identity and access management for the IoT.
Chapter 7, Mitigating IoT Privacy Concerns, explores IoT privacy concerns. It will also help you to understand how to address and mitigate such concerns.
Chapter 8, Setting Up a Compliance Monitoring Program for the IoT, helps you explore setting up an IoT compliance program.
Chapter 9, Cloud Security for the IoT, explains the concepts of cloud security that are related to the IoT.
Chapter 10, IoT Incident Response, explores incident management and forensics for the IoT.