The Internet of Things : Reduce Security Risks with Automated Policies
@inproceedings{TheIO, title={The Internet of Things : Reduce Security Risks with Automated Policies}, author={} }
The Internet of Things (IoT) is creating extraordinary opportunities in business, education, and government. But to take advantage of these opportunities, you first need to mitigate new kinds of security risks. This white paper, intended for IT and operational technology (OT) professionals, explains a new approach to IoT security, one that: ● Extends cybersecurity solutions to the OT environment and physical security solutions to the IT environment ● Correlates and analyzes data from IoT…
Tables from this paper
6 Citations
Towards Understanding Internet of Things Security and its Empirical Vulnerabilities: A Survey
- Computer ScienceInternational Journal of Advanced Computer Science and Applications
- 2019
This work establishes a state of the art concerning the IoT definition, protocols, environment, architecture and security, and exposes a case study of a standard IoT platform to illustrate the impact of security on all IoT layers.
Responding to and Preventing Threats to Cybersecurity When Utilizing the Internet of Things
- Computer Science
- 2018
This paper aims to propose solutions that will either prevent or respond to these cyberattacks, thus making systems more secure.
Autopolicy: Automated Traffic Policing for Improved IoT Network Security
- Computer ScienceSensors
- 2020
This paper proposes Autopolicy: a system that automatically limits the IP traffic bandwidth—and other network resources—available to IoT devices in a particular network, and presents a simple yet flexible architecture for AutopPolicy, specifying its functional blocks, message sequences, and general operation in a Software Defined Network.
Internet of Things in Digital Marketing and Data Security Concerns
- Computer Science
- 2018
Certain aspects of the Internet of Things (IoT), the role it plays in industrial and consumer spheres, and the implications of IoT for marketers are analyzed.
Security analysis of intelligent vehicles: Challenges and scope
- Computer Science2017 International SoC Design Conference (ISOCC)
- 2017
The challenges of automotive security in hardware and software are discussed, and a security architecture for automotive security is proposed and also future research challenges in automotive cyber security are mentioned.
IoT Based Temperature Sensors Monitoring for Smart Workload Distribution on Cloud
- Computer Science
- 2017
This project managed to show the usefulness of IoT enabled temperature sensor for monitoring the temperature aware workload scheduling in the cloud and suggests the use of smart workload distribution among CPUs with the help of IoT infrastructure so that cool thermal environment can be achieved.
One Reference
For More Information Read more about the Internet of Things at www.cisco.com/go/iot
- For More Information Read more about the Internet of Things at www.cisco.com/go/iot