{"title":"The TTPs of Privacy and Security of the IoT","authors":"Erin E. Kenneally","doi":"10.1109/MIOT.2018.8717595","DOIUrl":null,"url":null,"abstract":"In the inaugural column, the editor explores the privacy risks of the Internet of Things (IoT). This edition turns to the tactics, techniques, and practices (TTPs) that enable the management of security and privacy risks for IoT. Security professionals are likely familiar with this term of art in the context of cyber threat intelligence and incident response, only here has it been adapted it to help practitioners frame cyber security and privacy risk response for the IoT.","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"126 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Internet Things Mag.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MIOT.2018.8717595","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
In the inaugural column, the editor explores the privacy risks of the Internet of Things (IoT). This edition turns to the tactics, techniques, and practices (TTPs) that enable the management of security and privacy risks for IoT. Security professionals are likely familiar with this term of art in the context of cyber threat intelligence and incident response, only here has it been adapted it to help practitioners frame cyber security and privacy risk response for the IoT.