Home Robotics The Internet of Risky Things:

The Internet of Risky Things:

List Price :
Price : Check Price
Add to Cart


Title : The Internet of Risky Things: Trusting the Devices That Surround Us
Description :

By 2020, the Internet of Things (IoT) will consist of millions of computational devices intimately connected to real-world aspects of human life. In this insightful book, Professor Sean Smith, who worked in information security long before the web appeared, explains that if we build the IoT the way we built the current internet and other information technology initiatives, we’re headed for trouble.

With a focus on concrete solutions, The Internet of Risky Things explains how we can avoid simple flaws that have plagued several dramatic IT advances in recent decades. Developers, engineers, industrial designers, makers, and researchers will explore “design patterns of insecurities” and learn what’s required to route around or fix them in the nascent IoT.

  • Examine bugs that plague large-scale systems, including integer overflow, race conditions, and memory corruption
  • Look at successful and disastrous examples of previous quantum leaps in health IT, the smart grid, and autonomous vehicles
  • Explore patterns in coding, authentication, and cryptography that led to insecurity
  • Learn how blunders that led to spectacular IT disasters could have been avoided

The Internet of Risky Things: Trusting the Devices That Surround Us
Category: Robotics
Brand: O’Reilly Media
Item Page Detail URL : Click Here for details
Rating : 5.0
Rating : 2
Review : A wonderful teacher who left me very concerned about the security of the IoT
A grounded look at the security issues that already plague the Internet of Things and will challenge widespread adoption. The author is an excellent teacher. I opened this book out of a sense of obligation. I advise companies on pricing and monetization of the Industrial Internet of Things and security is a relevant economic value driver and thus a value metric. I left the book intellectually stimulated, eager to read more by this author, and deeply worried.

Smith grounds his work in an understanding of historical security issues and anti-patterns (Chapter 4 on Overcoming Design Patterns for Insecurity is worth committing to memory). He gives many examples, some well known other probably only followed by security experts. The treatment of the Volkswagen scandal where the emissions controls were intentionally designed to trick regulators brings an interesting perspective. The final chapter that references Ogden and Richard’s seminal work on semiology was eye opening…