Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Learning AWS IoT
  • Table Of Contents Toc
  • Feedback & Rating feedback
Learning AWS IoT

Learning AWS IoT

By : Kurniawan
2.8 (6)
close
close
Learning AWS IoT

Learning AWS IoT

2.8 (6)
By: Kurniawan

Overview of this book

The Internet of Things market increased a lot in the past few years and IoT development and its adoption have showed an upward trend. Analysis and predictions say that Enterprise IoT platforms are the future of IoT. AWS IoT is currently leading the market with its wide range of device support SDKs and versatile management console. This book initially introduces you to the IoT platforms, and how it makes our IoT development easy. It then covers the complete AWS IoT Suite and how it can be used to develop secure communication between internet-connected things such as sensors, actuators, embedded devices, smart applications, and so on. The book also covers the various modules of AWS: AWS Greengrass, AWS device SDKs, AWS IoT Platform, AWS Button, AWS Management consoles, AWS-related CLI, and API references, all with practical use cases. Near the end, the book supplies security-related best practices to make bi-directional communication more secure. When you've finished this book, you'll be up-and-running with the AWS IoT Suite, and building IoT projects.
Table of Contents (10 chapters)
close
close

Understanding IoT risks


Understanding your project's implementation  is crucial to understanding the security risks associated with it. When you decide on an architecture solution for your project, you should understand the pros and cons from your solution. In the security context, if you understand your IoT projects risks, you will be aware of potential threats to your project. One of the potential risks is security. When we talk about security risk, we are talking about security threats. Security threats can originate from two primary sources—humans and nature.

You can find a list of common security threats for IT in general. One of the resources is https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx. Some security books also provide security threat index for IT. 

After we have identified security threats, we can mitigate the findings. To perform mitigation, it probably requires stakeholders to address the issue. Mitigation from threats should be validated in order to be sure of getting...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY