{"title":"大数据问题","authors":"K. K., D. R., S. S.","doi":"10.4018/978-1-7998-3111-2.ch008","DOIUrl":null,"url":null,"abstract":"Various unimaginable opportunities and applications can be attained by the development of internet-connected automation. The network system with numerous wired or wireless smart sensors is called as IoT. It is showing various enhancement for past few years. Without proper security protection, various attacks and threats like cyberattacks threat causes serious disaster to IoT from the day it was introduced. Hence, IoT security system is improvised by various security and the management techniques. There are six sections in security management of IoT works. IoT security requirement is described intensively. The proposed layered of security management architecture is being defined and explained. Thus, this proposed architecture shows the security management system for IoT network tight security management for a network of the IoT which is elaborately explained with examples and about GDPR. In information security, intrusion recognizable proof is the showing of placing exercises that attempt to deal the protection, respectability, or availability of a benefit.","PeriodicalId":372297,"journal":{"name":"Advances in Web Technologies and Engineering","volume":"198 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Big Data Issues\",\"authors\":\"K. K., D. R., S. S.\",\"doi\":\"10.4018/978-1-7998-3111-2.ch008\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Various unimaginable opportunities and applications can be attained by the development of internet-connected automation. The network system with numerous wired or wireless smart sensors is called as IoT. It is showing various enhancement for past few years. Without proper security protection, various attacks and threats like cyberattacks threat causes serious disaster to IoT from the day it was introduced. Hence, IoT security system is improvised by various security and the management techniques. There are six sections in security management of IoT works. IoT security requirement is described intensively. The proposed layered of security management architecture is being defined and explained. Thus, this proposed architecture shows the security management system for IoT network tight security management for a network of the IoT which is elaborately explained with examples and about GDPR. In information security, intrusion recognizable proof is the showing of placing exercises that attempt to deal the protection, respectability, or availability of a benefit.\",\"PeriodicalId\":372297,\"journal\":{\"name\":\"Advances in Web Technologies and Engineering\",\"volume\":\"198 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Advances in Web Technologies and Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/978-1-7998-3111-2.ch008\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Advances in Web Technologies and Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/978-1-7998-3111-2.ch008","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Various unimaginable opportunities and applications can be attained by the development of internet-connected automation. The network system with numerous wired or wireless smart sensors is called as IoT. It is showing various enhancement for past few years. Without proper security protection, various attacks and threats like cyberattacks threat causes serious disaster to IoT from the day it was introduced. Hence, IoT security system is improvised by various security and the management techniques. There are six sections in security management of IoT works. IoT security requirement is described intensively. The proposed layered of security management architecture is being defined and explained. Thus, this proposed architecture shows the security management system for IoT network tight security management for a network of the IoT which is elaborately explained with examples and about GDPR. In information security, intrusion recognizable proof is the showing of placing exercises that attempt to deal the protection, respectability, or availability of a benefit.