{"title":"物联网安全现场笔记:大规模异构物联网部署的新型JIT安全","authors":"Karl Mozurkewich","doi":"10.1145/3503919","DOIUrl":null,"url":null,"abstract":"This article provides an overview of specific security considerations for multi-modal Internet-of-Things(IoT) use-case deployment. With the year-over-year exponential increase in smartdevice deployments, threat vectors continue to fall into a concise list of categories, all of which can be addressed with classic solution architectures. To provide increased business value from technology deployments, we look at applying novel additions to common deployment architectures to achieve high return-on-investment (ROI) on our deployments, while managing the security risk associated with heterogeneous device deployments.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"73 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Field Note on IoT Security: Novel JIT Security for Large-Scale Heterogeneous IoT Deployments\",\"authors\":\"Karl Mozurkewich\",\"doi\":\"10.1145/3503919\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article provides an overview of specific security considerations for multi-modal Internet-of-Things(IoT) use-case deployment. With the year-over-year exponential increase in smartdevice deployments, threat vectors continue to fall into a concise list of categories, all of which can be addressed with classic solution architectures. To provide increased business value from technology deployments, we look at applying novel additions to common deployment architectures to achieve high return-on-investment (ROI) on our deployments, while managing the security risk associated with heterogeneous device deployments.\",\"PeriodicalId\":202552,\"journal\":{\"name\":\"Digital Threats: Research and Practice\",\"volume\":\"73 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-05-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Digital Threats: Research and Practice\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3503919\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Digital Threats: Research and Practice","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3503919","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Field Note on IoT Security: Novel JIT Security for Large-Scale Heterogeneous IoT Deployments
This article provides an overview of specific security considerations for multi-modal Internet-of-Things(IoT) use-case deployment. With the year-over-year exponential increase in smartdevice deployments, threat vectors continue to fall into a concise list of categories, all of which can be addressed with classic solution architectures. To provide increased business value from technology deployments, we look at applying novel additions to common deployment architectures to achieve high return-on-investment (ROI) on our deployments, while managing the security risk associated with heterogeneous device deployments.