- Paperback: 240 pages
- Publisher: O'Reilly Media; 1 edition (January 29, 2017)
- Language: English
- ISBN-10: 149196362X
- ISBN-13: 978-1491963623
- Product Dimensions: 6 x 0.5 x 9 inches
- Shipping Weight: 8 ounces (View shipping rates and policies)
- Average Customer Review: 2 customer reviews
Amazon Best Sellers Rank:
#1,047,069 in Books (See Top 100 in Books)
- #113 in Books > Engineering & Transportation > Engineering > Electrical & Electronics > Electronics > Sensors
- #243 in Books > Computers & Technology > Graphics & Design > Computer Modelling > Remote Sensing & GIS
- #253 in Books > Engineering & Transportation > Engineering > Industrial, Manufacturing & Operational Systems > Industrial Technology
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
The Internet of Risky Things: Trusting the Devices That Surround Us 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
Frequently bought together
Customers who bought this item also bought
Customers who viewed this item also viewed
About the Author
Professor Sean Smith has been working in information security--attacks and defenses, for industry and government--since before there was a Web. In graduate school, he worked with the US Postal Inspection Service on postal meter fraud; as a post-doc and staff member at Los Alamos National Laboratory, he performed security reviews, designs, analyses, and briefings for a wide variety of public-sector clients; at IBM T.J. Watson Research Center, he designed the security architecture for (and helped code and test) the IBM 4758 secure coprocessor, and then led the formal modeling and verification work that earned it the world's first FIPS 140-1 Level 4 security validation.
In July 2000, Sean left IBM for Dartmouth, since he was convinced that the academic education and research environment is a better venue for changing the world. His current work, as PI of the Dartmouth Trust Lab and Director of Dartmouth's Institute for Security, Technology, and Society investigates how to build trustworthy systems in the real world.
At Dartmouth, many of his courses have been named "favorite classes" by graduating seniors. His book Trusted Computing Platforms: Design and Applications (Springer, 2005) provides a deeper presentation of this research journey; his book The Craft of System Security (Addison-Wesley, 2007) resulted from the educational journey.
Sean has published over one hundred refereed papers; been granted over a dozen patents; and advised over three dozen Ph.D., M.S., and senior honors theses. He and his students have won several "Best Paper" awards.
Sean was educated at Princeton and CMU, and is a member of Phi Beta Kappa and Sigma Xi.
Author interviews, book reviews, editors picks, and more. Read it now
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
Smith grounds his work in an understanding of historical security issues and anti-patterns (Chapter 4 on Overcoming Design Patterns for Insecurity is worth committing to memory). He gives many examples, some well known other probably only followed by security experts. The treatment of the Volkswagen scandal where the emissions controls were intentionally designed to trick regulators brings an interesting perspective. The final chapter that references Ogden and Richard's seminal work on semiology was eye opening. Understanding the interacting roles of users' mental models, the system model and the real world and how mappings lead to security issues was thought provoking.
Two points really stuck with me. The lifespan of physical objects is much longer than that of most software. The methods (only partially successful) that we have developed for security on the Internet of Computers, are not likely to scale across time. There is a real risk of having large numbers of legacy devices with compromised security. The surface for attack in the Internet of Things is orders of magnitude larger than in the Internet of Computers.There are many more insertion points and types of insertion points. Our current approaches will not scale over space either.
This book should be read well beyond security geeks, or even IoT implementers. There are insights and models here that are widely applicable.