語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Security Frameworks for Machine-to-M...
~
Demblewski, Michael.
FindBook
Google Book
Amazon
博客來
Security Frameworks for Machine-to-Machine Devices and Networks.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Security Frameworks for Machine-to-Machine Devices and Networks./
作者:
Demblewski, Michael.
面頁冊數:
156 p.
附註:
Source: Dissertation Abstracts International, Volume: 77-02(E), Section: B.
Contained By:
Dissertation Abstracts International77-02B(E).
標題:
Information technology. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3726428
ISBN:
9781339111292
Security Frameworks for Machine-to-Machine Devices and Networks.
Demblewski, Michael.
Security Frameworks for Machine-to-Machine Devices and Networks.
- 156 p.
Source: Dissertation Abstracts International, Volume: 77-02(E), Section: B.
Thesis (Ph.D.)--Nova Southeastern University, 2015.
Attacks against mobile systems have escalated over the past decade. There have been increases of fraud, platform attacks, and malware. The Internet of Things (IoT) offers a new attack vector for Cybercriminals. M2M contributes to the growing number of devices that use wireless systems for Internet connection. As new applications and platforms are created, old vulnerabilities are transferred to next-generation systems. There is a research gap that exists between the current approaches for security framework development and the understanding of how these new technologies are different and how they are similar. This gap exists because system designers, security architects, and users are not fully aware of security risks and how next-generation devices can jeopardize safety and personal privacy. Current techniques, for developing security requirements, do not adequately consider the use of new technologies, and this weakens countermeasure implementations. These techniques rely on security frameworks for requirements development. These frameworks lack a method for identifying next generation security concerns and processes for comparing, contrasting and evaluating non-human device security protections. This research presents a solution for this problem by offering a novel security framework that is focused on the study of the "functions and capabilities" of M2M devices and improves the systems development life cycle for the overall IoT ecosystem.
ISBN: 9781339111292Subjects--Topical Terms:
532993
Information technology.
Security Frameworks for Machine-to-Machine Devices and Networks.
LDR
:02348nmm a2200289 4500
001
2073362
005
20160915132432.5
008
170521s2015 ||||||||||||||||| ||eng d
020
$a
9781339111292
035
$a
(MiAaPQ)AAI3726428
035
$a
AAI3726428
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Demblewski, Michael.
$3
3188598
245
1 0
$a
Security Frameworks for Machine-to-Machine Devices and Networks.
300
$a
156 p.
500
$a
Source: Dissertation Abstracts International, Volume: 77-02(E), Section: B.
500
$a
Adviser: Glenn Stout.
502
$a
Thesis (Ph.D.)--Nova Southeastern University, 2015.
520
$a
Attacks against mobile systems have escalated over the past decade. There have been increases of fraud, platform attacks, and malware. The Internet of Things (IoT) offers a new attack vector for Cybercriminals. M2M contributes to the growing number of devices that use wireless systems for Internet connection. As new applications and platforms are created, old vulnerabilities are transferred to next-generation systems. There is a research gap that exists between the current approaches for security framework development and the understanding of how these new technologies are different and how they are similar. This gap exists because system designers, security architects, and users are not fully aware of security risks and how next-generation devices can jeopardize safety and personal privacy. Current techniques, for developing security requirements, do not adequately consider the use of new technologies, and this weakens countermeasure implementations. These techniques rely on security frameworks for requirements development. These frameworks lack a method for identifying next generation security concerns and processes for comparing, contrasting and evaluating non-human device security protections. This research presents a solution for this problem by offering a novel security framework that is focused on the study of the "functions and capabilities" of M2M devices and improves the systems development life cycle for the overall IoT ecosystem.
590
$a
School code: 1191.
650
4
$a
Information technology.
$3
532993
650
4
$a
Nanotechnology.
$3
526235
650
4
$a
Systems science.
$3
3168411
690
$a
0489
690
$a
0652
690
$a
0790
710
2
$a
Nova Southeastern University.
$b
Information Systems.
$3
1270777
773
0
$t
Dissertation Abstracts International
$g
77-02B(E).
790
$a
1191
791
$a
Ph.D.
792
$a
2015
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3726428
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9306230
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入