Академический Документы
Профессиональный Документы
Культура Документы
http://www.infoworld.com/category/security/
http://www.infoworld.com/article/3144362/devops/10-key-security-terms-devops-nin
jas-need-to-know.html//
[Paraphrase the paragrapgh: ReWrite in your own words] However, the integrat
ion of these smart things into the standard Internet , Moreover, commercializati
on of IoT has led to public security concerns, including personal privacy issues
, threat of cyber attacks, and organized crime. , this survey attempts to provid
e a comprehensive list of vulnerabilities and countermeasures against services o
n the edge-side layer of IoT, which consists of three levels: (i) edge nodes, (i
i) communication, and (iii) edge computing. To achieve this goal, a brief discus
sion of three widely-known IoT reference models and definition of security in t
he context of IoT healthcare is made. Second, we discuss the possible applicatio
ns of IoT and potential motivations of the attackers who target this new paradig
m. Third, we discuss different attacks and threats [Arsalan Mohsen Nia, Student
Member, IEEE and Niraj K. Jha, A Comprehensive Study of Security of Internet-of-T
hings Fellow, IEEEhttp://0-ieeexplore.ieee.org.brum.beds.ac.uk/stamp/stamp.jsp?ar
number=7562568]
[Mine]Consideration for preservation of security at the edge of computing device
s at which point data is processed and Your insecure product may not be the ult
imate target but could provide the pivot point for an attack elsewhere in the sy
stem.The study survey models and standard of IoT in the healthcare practices an
d identifies emerging security threats and privacy issues at the edge of IoT con
sumer patience where there is an uphill to physically secure smart devices, heal
th safety, to ensure trust and privacy of data exchange on the patience network.
This paper surveys both physical and data security issues, including privacy co
ncern at the edge side layer of IoT. [Mine]. The paper is more concerned with Io
T consumer technologies involving the technologies and the users. Emphasis is pl
aced on security of human medical health systems at the edge side layer of IoT r
eference model.
A. Mohsen Nia; N. K. Jha, "A Comprehensive Study of Security of Internet-of-Thin
gs," in IEEE Transactions on Emerging Topics in Computing , vol.PP, no.99, pp.1-
1 doi: 10.1109/TETC.2016.2606384
II THE IoT SYSTEM MODEL
{For|Intended for} knowledge of security challenges in IoT system, it is imperat
ive to understand the building block with regard to functionality and requiremen
t. The survey considers the CISCO seven layers model in [A. Mohsen Nia; N. K. Jh
a, "A Comprehensive Study of Security of Internet-of-Things," in IEEE Transactio
ns on Emerging Topics in Computing , vol.PP, no.99, pp.1-1 doi: 10.1109/TETC.201
6.2606384 [Mine]