Applied Approach to Privacy and Security for the Internet of Things最新文献

筛选
英文 中文
IoT Forensic Science 物联网法医学
Applied Approach to Privacy and Security for the Internet of Things Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-2444-2.ch001
E. Casey, Hannes Spichiger, Elénore Ryser, Francesco Servida, D. Jaquet-Chiffelle
{"title":"IoT Forensic Science","authors":"E. Casey, Hannes Spichiger, Elénore Ryser, Francesco Servida, D. Jaquet-Chiffelle","doi":"10.4018/978-1-7998-2444-2.ch001","DOIUrl":"https://doi.org/10.4018/978-1-7998-2444-2.ch001","url":null,"abstract":"IoT devices produce information that can be used in criminal investigations and cybersecurity incidents to make inferences about identities, locations, chronologies, and relationships between relevant entities. Before this information is relied upon to make critical decisions, its veracity must be assessed critically, and the link between virtual and physical worlds must be evaluated carefully. This chapter presents the forensic science principles needed to exploit the full potential of IoT traces, including uniqueness, exchange, provenance, integrity, reliability, repeatability, evaluating links between virtual and physical entities, and formally assessing alternative hypotheses. This chapter also discusses core forensic processes and activities, demonstrating their application to forensic analysis of IoT devices using practical examples. A typology of IoT traces is proposed and their usefulness during an investigation is discussed. Finally, an investigative scenario is presented to illustrate the opportunities and challenges of exploiting IoT devices and traces for investigative and forensic purposes.","PeriodicalId":320924,"journal":{"name":"Applied Approach to Privacy and Security for the Internet of Things","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134512214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Security Management System 资讯安全管理系统
Applied Approach to Privacy and Security for the Internet of Things Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-2444-2.ch010
M. K. Srivastav
{"title":"Information Security Management System","authors":"M. K. Srivastav","doi":"10.4018/978-1-7998-2444-2.ch010","DOIUrl":"https://doi.org/10.4018/978-1-7998-2444-2.ch010","url":null,"abstract":"Security of information is always a challenging domain for any computer network organization. An organization always sets different types of policies with the course of time so that no information can be leaked. Some external or some internal factors of an organization play important roles in revealing the information. An organization mainly depends on its employees. An employee manages the data and information and there exists some chance among employees to reveal the data. There is need to study and set policies for employees so that no full information can be revealed. Information security management system (ISMS) has collection of different types of policies and procedures for systematically managing organizationally sensitive data. ISMSs have to deal with management of employees of an organization to minimize the risk of revealing information. This chapter studies employee management so that an organization can continue its business securely.","PeriodicalId":320924,"journal":{"name":"Applied Approach to Privacy and Security for the Internet of Things","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128689087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信