
The Internet of Risky Things
Trusting the Devices That Surround Us
Publisher: O'Reilly Media
Release Date: January 2017
Pages: 229
Read on Safari with a 10-day trial
Start your free trial now Buy on AmazonWhere’s the cart? Now you can get everything on Safari. To purchase books, visit Amazon or your favorite retailer. Questions? See our FAQ or contact customer service:
1-800-889-8969 / 707-827-7019
support@oreilly.com
By 2020, the Internet of Things (IoT) will consist of millions of computational devices intimately connected to real-world aspects of human life. In this insightful book, Professor Sean Smith, who worked in information security long before the web appeared, explains that if we build the IoT the way we built the current internet and other information technology initiatives, we’re headed for trouble.
With a focus on concrete solutions, The Internet of Risky Things explains how we can avoid simple flaws that have plagued several dramatic IT advances in recent decades. Developers, engineers, industrial designers, makers, and researchers will explore "design patterns of insecurities" and learn what’s required to route around or fix them in the nascent IoT.
- Examine bugs that plague large-scale systems, including integer overflow, race conditions, and memory corruption
- Look at successful and disastrous examples of previous quantum leaps in health IT, the smart grid, and autonomous vehicles
- Explore patterns in coding, authentication, and cryptography that led to insecurity
- Learn how blunders that led to spectacular IT disasters could have been avoided
Table of Contents
-
Chapter 1 Brave New Internet
-
Worst-Case Scenarios: Cyber Love Canal
-
What’s Different?
-
Inevitable and Unfortunate Decay
-
The IoT’s Impact on the Physical World
-
The Physical World’s Impact on the IoT
-
Worst-Case Scenarios: Cyber Pearl Harbor
-
Where to Go Next
-
Works Cited
-
-
Chapter 2 Examples and Building Blocks
-
Computing Devices
-
Architectures for an IoT
-
The Bigger Picture
-
What’s Next
-
Works Cited
-
-
Chapter 3 The Future Has Been Here Before
-
Bug Background
-
Smart Health IT
-
Smart Grid
-
Smart Vehicles
-
Not Repeating Past Mistakes
-
Works Cited
-
-
Chapter 4 Overcoming Design Patterns for Insecurity
-
Anti-Pattern: Doing Too Much
-
Anti-Pattern: Coding Blunders
-
Anti-Pattern: Authentication Blunders
-
Anti-Pattern: Cryptography Blunders
-
A Better Future
-
Works Cited
-
-
Chapter 5 Names and Identity in the IoT
-
Who Is That, Really?
-
The Standard Cryptographic Toolkit
-
The Newer Toolkit
-
IoT Challenges
-
Moving Forward
-
Works Cited
-
-
Chapter 6 The Internet of Tattletale Devices
-
Cautionary Tales
-
When Things Betray Their Owners
-
Emerging Infrastructure for Spying
-
Getting What We Want
-
Works Cited
-
-
Chapter 7 Business, Things, and Risks
-
How the IoT Changes Business
-
Profit and Safety
-
When the User Is the Product
-
Profit and Technological Choices
-
Businesses and Things and People
-
Works Cited
-
-
Chapter 8 Laws, Society, and Things
-
When Technology Evades Law
-
When Law Stops Scrutiny of Technology
-
When New Things Don’t Fit Old Paradigms
-
Looking Forward
-
Works Cited
-
-
Chapter 9 The Digital Divide and the IoT
-
How Digital Divides Emerged in the IoC
-
How Digital Divides May Continue in the IoT
-
When IT Is Required to Support Basic Rights
-
The IoT Enforcing Preexisting Socioeconomic Divides
-
The IoT Creating Divides Among Connected Classes
-
Looking Forward
-
Works Cited
-
-
Chapter 10 The Future of Humans and Machines
-
A Framework for Interconnection
-
Human/Machine Interconnection in the IoT
-
Ethical Choices in the IoT Age
-
Perception of Boundaries in the IoT Age
-
Human Work in the IoT Age
-
Brave New Internet, with Brave New People in It
-
Works Cited
-