Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Security Frameworks for Machine-to-M...
~
Demblewski, Michael.
Linked to FindBook
Google Book
Amazon
博客來
Security Frameworks for Machine-to-Machine Devices and Networks.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Security Frameworks for Machine-to-Machine Devices and Networks./
Author:
Demblewski, Michael.
Description:
156 p.
Notes:
Source: Dissertation Abstracts International, Volume: 77-02(E), Section: B.
Contained By:
Dissertation Abstracts International77-02B(E).
Subject:
Information technology. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3726428
ISBN:
9781339111292
Security Frameworks for Machine-to-Machine Devices and Networks.
Demblewski, Michael.
Security Frameworks for Machine-to-Machine Devices and Networks.
- 156 p.
Source: Dissertation Abstracts International, Volume: 77-02(E), Section: B.
Thesis (Ph.D.)--Nova Southeastern University, 2015.
Attacks against mobile systems have escalated over the past decade. There have been increases of fraud, platform attacks, and malware. The Internet of Things (IoT) offers a new attack vector for Cybercriminals. M2M contributes to the growing number of devices that use wireless systems for Internet connection. As new applications and platforms are created, old vulnerabilities are transferred to next-generation systems. There is a research gap that exists between the current approaches for security framework development and the understanding of how these new technologies are different and how they are similar. This gap exists because system designers, security architects, and users are not fully aware of security risks and how next-generation devices can jeopardize safety and personal privacy. Current techniques, for developing security requirements, do not adequately consider the use of new technologies, and this weakens countermeasure implementations. These techniques rely on security frameworks for requirements development. These frameworks lack a method for identifying next generation security concerns and processes for comparing, contrasting and evaluating non-human device security protections. This research presents a solution for this problem by offering a novel security framework that is focused on the study of the "functions and capabilities" of M2M devices and improves the systems development life cycle for the overall IoT ecosystem.
ISBN: 9781339111292Subjects--Topical Terms:
532993
Information technology.
Security Frameworks for Machine-to-Machine Devices and Networks.
LDR
:02348nmm a2200289 4500
001
2073362
005
20160915132432.5
008
170521s2015 ||||||||||||||||| ||eng d
020
$a
9781339111292
035
$a
(MiAaPQ)AAI3726428
035
$a
AAI3726428
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Demblewski, Michael.
$3
3188598
245
1 0
$a
Security Frameworks for Machine-to-Machine Devices and Networks.
300
$a
156 p.
500
$a
Source: Dissertation Abstracts International, Volume: 77-02(E), Section: B.
500
$a
Adviser: Glenn Stout.
502
$a
Thesis (Ph.D.)--Nova Southeastern University, 2015.
520
$a
Attacks against mobile systems have escalated over the past decade. There have been increases of fraud, platform attacks, and malware. The Internet of Things (IoT) offers a new attack vector for Cybercriminals. M2M contributes to the growing number of devices that use wireless systems for Internet connection. As new applications and platforms are created, old vulnerabilities are transferred to next-generation systems. There is a research gap that exists between the current approaches for security framework development and the understanding of how these new technologies are different and how they are similar. This gap exists because system designers, security architects, and users are not fully aware of security risks and how next-generation devices can jeopardize safety and personal privacy. Current techniques, for developing security requirements, do not adequately consider the use of new technologies, and this weakens countermeasure implementations. These techniques rely on security frameworks for requirements development. These frameworks lack a method for identifying next generation security concerns and processes for comparing, contrasting and evaluating non-human device security protections. This research presents a solution for this problem by offering a novel security framework that is focused on the study of the "functions and capabilities" of M2M devices and improves the systems development life cycle for the overall IoT ecosystem.
590
$a
School code: 1191.
650
4
$a
Information technology.
$3
532993
650
4
$a
Nanotechnology.
$3
526235
650
4
$a
Systems science.
$3
3168411
690
$a
0489
690
$a
0652
690
$a
0790
710
2
$a
Nova Southeastern University.
$b
Information Systems.
$3
1270777
773
0
$t
Dissertation Abstracts International
$g
77-02B(E).
790
$a
1191
791
$a
Ph.D.
792
$a
2015
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3726428
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9306230
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login