Centro de Documentação da PJ
Monografia

CD318
ENISA
Guidelines for securing The Internet of Things [Documento electrónico] : secure supply chain for IoT / Christina Skouloudi ..[et al.].- Attiki : European Union Agency for Cybersecurity, ENISA, 2020.- 1 CD-ROM ; 12 cm
Ficheiro de 1,73 MB em formato PDF (52 p.).
ISBN 978-92-9204-411-4


SEGURANÇA INFORMÁTICA, INTERNET DAS COISAS, PROTECÇÃO DA INFORMAÇÃO

Introduction. 1.1 Objectives. 1.2 Scope. 1.3 Target audience. 1.4 Methodology. 1.5 Structure of the document. 2. Overview of IoT supply chain. 2.1 Supply chain reference model for IoT. 2.2 Description of IoT supply chain stages. 2.3 Mapping of the IoT supply chain. 3. Threats to IoT supply chain. 3.1 Physical attack (deliberate/intentional). 3.2 Intellectual property loss. 3.3 Nefarious activity/abuse. 3.4. Legal. 3.5 Unintentional damage or loss of information. 4. Good practices for security of IoT supply chain. 4.1 Security considerations. 4.2 Good practices to improve security. 5. Guidelines and conclusions. 5.1 Forging better relationships between actors. 5.2 Cybersecurity expertise should be further cultivated. 5.3 Security by design. 5.4 Take a comprehensive and explicit approach to security. 5.5 Leverage existing standards and good practices. A Annex: mapping of threats to good practices. A.1 Actors. A.2 Processes. A.3 Technologies. B Annex: summary of the most relevant standards.