【24h】

A REVIEW OF SECURITY FRAMEWORKS FOR INTERNET OF THINGS

机译:对东西互联网安全框架的审查

获取原文

摘要

By 2020, it's estimated that the amount of connected devices is predicted to grow exponentially to fifty billion. internet of things has gained intensive attention, the deployment of sensors, actuators are increasing at a speedy pace round the world. there's tremendous scope for a lot of efficient living through a rise of smart services, however this coincides with a rise in security and privacy issues. there's a desire to perform a scientific review of information security governance frameworks within the internet of things (IoT) Objective The aim of this paper to evaluate systematic review of information security management frameworks that are related to the internet of things (IoT). it'll additionally discuss totally different information security frameworks that IoT models and deployments across different verticals. These frameworks are classified in line with the realm of the framework, the security executives and senior management of any enterprise that plans to start out mistreatment good services must outline a transparent governance strategy regarding the safety of their assets, this method review can facilitate them to create an improved decision for their investment for secure IoT deployments. Method - a set of standard criteria has been established to investigate which security framework are the most effective work among these classified security structures in notably for net of Things (IoT). the primary step to judge security framework by victimisation commonplace criteria methodology is to identify resources, the safety framework for IoT is chosen to be assessed in line with CCS. The second step is to develop a group of Security Targets (ST). The ST is that the set of criteria to use for the target of analysis (TOE). The third step is data extraction; fourth step data synthesis; and final step is to write-up study as a report. Conclusion - after reviewing four information security risk frameworks, this study makes some suggestions associated with information security risk governance in internet of Things (IoT). The organizations that have determined to maneuver to smart devices ought to outline the advantages and risks and preparation processes to manage security risk. the knowledge security risk policies ought to befits an organization's IT policies and standards to guard the confidentiality, integrity and handiness of knowledge security. The study observes a number of the most processes that are required to manage security risks. Moreover, the paper additionally drew attention on some suggestions which will assist corporations that square measure related to the knowledge security framework in internet of things (IoT).
机译:到2020年,估计预测连接装置的数量以指数增长至五十亿。事情互联网越来越强烈关注,传感器的部署,执行器正在迅速迅速涌现。通过智能服务的崛起,大量有效的生活范围很大,但这一致恰逢安全和隐私问题。希望在物联网(物联网)内部对信息安全治理框架进行科学审查,这些论文的目的是评估与事物互联网(物联网)相关的信息安全管理框架的系统审查。它还可以讨论完全不同的信息安全框架,即跨不同垂直的IoT模型和部署。这些框架符合框架的境界,任何计划开始误解误解的企业的安全管理人员和高级管理人员必须概述其资产安全的透明治理策略,这项方法审查可以促进他们为自己的安全IOT部署创建改进的决定。方法 - 已经建立了一组标准标准,以调查哪种安全框架是这些安全框架,这些安全结构中最有效的工作,特别是对于物品网(物联网)。判断安全框架的主要步骤是由受害普通的标准方法学识别资源,选择IOT的安全框架以符合CCS。第二步是开发一组安全目标(ST)。 ST是用于分析目标(TOE)的标准集。第三步是数据提取;第四步数据合成;最后一步是作为报告的写作研究。结论 - 审查了四个信息安全风险框架后,本研究对事物互联网(物联网)的信息安全风险治理有所了解。决定智能设备的机构的组织应该概述管理安全风险的优缺点和准备流程。知识安全风险策略应该支持组织的IT政策和标准,以保护知识安全的机密性,完整性和方便。该研究观察管理安全风险所需的许多进程。此外,本文还提请注意一些建议,这些建议可以帮助方案措施与知识安全框架中的方形互联网(物联网)有关。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号