IoT Devices Cyber Security and Risk Management
Learn how to Secure your IoT Devices
IT and Software ,Network and Security,Cyber Security
Lectures -8
Duration -1 hours
Lifetime Access
Lifetime Access
30-days Money-Back Guarantee
Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.
Course Description
The Internet of Things (IoT) describes physical objects (or groups of such objects), that are embedded with bread, processing ability, software, and other technologies, and that connect and exchange data with other devices and systems over the Internet or other communications networks.
IOT Devices Capabilities:
- Transducer.
- Interface.
- Application Interface.
- Human user interface.
- Network interface.
Challenges with IoT(Internet of Things) in comparison to IT(Information Technology):
Many IoT devices interact with the physical world in ways conventional IT devices usually do not
Many IoT devices cannot be accessed, managed, or monitored in the same ways conventional IT devices can
Lack of management features.
Lack of interfaces
Difficulties with management at scale
Wide variety of software to manage
Differing lifespan expectations
Unserviceable hardware
Lack of inventory capabilities
Heterogeneous ownership
The availability, efficiency, and effectiveness of cybersecurity and privacy capabilities are often different for IoT devices than conventional IT devices.
How to Mitigate IoT Risk?
Protect Device Security
Asset Management
Vulnerability Management
Protect Data Security
Data Protection
Data Security Incident Detection
Protect Individuals’ Privacy
Information Flow Management
PII Processing Permissions Management
Informed Decision Making
How can manufacturers help to achieve Cyber Security?
Activity 1: Identify Expected Customers and Define Expected Use Cases
Which types of people are expected customers for this device?
Which types of organizations are expected customers for this device?
Activity 2: Research Customer Cybersecurity Needs and Goals:
How will the IoT device interact with the physical world?
How will the IoT device need to be accessed, managed, and monitored by authorized people, processes, and other devices?
What are the known cybersecurity requirements for the IoT device?
Activity 3: Determine How to Address Customer Needs and Goals:
Which one or more of the following is a suitable means (or combination of means) to achieve the need or goal?
How robustly must each technical means be implemented in order to achieve the cybersecurity need or goal?
Activity 4: Plan for Adequate Support of Customer Needs and Goals:
Considering expected terms of support and lifespan, what potential future use needs to be taken into account?
Should an established IoT platform be used instead of acquiring and integrating individual hardware and software components?
Goals
- IoT devices
- How it is different from IT
- How to make them secure?
- How to mitigate their risk?
- What are the challenges of their risk mitigation?
Prerequisites
- NA.

Curriculum
Check out the detailed breakdown of what’s inside the course
IoT Devices
2 Lectures
-
IoT device Overview 04:48 04:48
-
Difference between IT & IoT 12:30 12:30
IoT Devices - Risk Mitigation
3 Lectures

IoT Devices - Cyber Security for Manufacturers
3 Lectures

Instructor Details

Abha Sood
I am Abha with 11+ years of experience with Governance, Risk and Compliance. I have intensive knowledge of SAP Security, GRC ( Access Control, Process Control, Risk Management), SAP Audit Management, Industrial standards and regulations such as SOX, GDPR, PCI DSS, NIST Cyber Security, HIPAA etc.
Certifications:
1. CISA
2. CISM
3. SAP GRC
4. RPA - BluePrism
5. Prince2 Practitioner
6. Agile scrum foundation
Course Certificate
Use your certificate to make a career change or to advance in your current career.

Our students work
with the Best


































Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe now
Online Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now