{"title":"物联网隐私和安全的https","authors":"Erin E. Kenneally","doi":"10.1109/MIOT.2018.8717595","DOIUrl":null,"url":null,"abstract":"In the inaugural column, the editor explores the privacy risks of the Internet of Things (IoT). This edition turns to the tactics, techniques, and practices (TTPs) that enable the management of security and privacy risks for IoT. Security professionals are likely familiar with this term of art in the context of cyber threat intelligence and incident response, only here has it been adapted it to help practitioners frame cyber security and privacy risk response for the IoT.","PeriodicalId":409551,"journal":{"name":"IEEE Internet Things Mag.","volume":"126 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"The TTPs of Privacy and Security of the IoT\",\"authors\":\"Erin E. Kenneally\",\"doi\":\"10.1109/MIOT.2018.8717595\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the inaugural column, the editor explores the privacy risks of the Internet of Things (IoT). This edition turns to the tactics, techniques, and practices (TTPs) that enable the management of security and privacy risks for IoT. Security professionals are likely familiar with this term of art in the context of cyber threat intelligence and incident response, only here has it been adapted it to help practitioners frame cyber security and privacy risk response for the IoT.\",\"PeriodicalId\":409551,\"journal\":{\"name\":\"IEEE Internet Things Mag.\",\"volume\":\"126 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Internet Things Mag.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MIOT.2018.8717595\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Internet Things Mag.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MIOT.2018.8717595","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In the inaugural column, the editor explores the privacy risks of the Internet of Things (IoT). This edition turns to the tactics, techniques, and practices (TTPs) that enable the management of security and privacy risks for IoT. Security professionals are likely familiar with this term of art in the context of cyber threat intelligence and incident response, only here has it been adapted it to help practitioners frame cyber security and privacy risk response for the IoT.