Steps to Implementing Security by Design for IoT

 

IoT security by design might seem like a buzzword in that it’s not well-defined in the consumer landscape, but KORE Wireless’s Chris Francosky said the most effective security measures are put in place well before production even begins.

Host Shelby Skrhak sat down with Francosky on this episode of the Industrial IoT podcast, brought to you by MarketScale.

“I’m evangelizing this idea of a five-step process centered around threat modeling, which is at the heart of security by design,” Francosky said.

5 Step Process for Threat Modeling

  1. Define your assets – not only devices, but the data, as well.
  2. Decompose that application through an architecture diagram so you can see clearly how the application is broken up.
  3. Look at each area of the decomposed application and identify threats.
  4. Document threats.
  5. Rate and prioritize threats

How do you recognize threats? In the late 1990s, Microsoft devised an acronym that summarizes the kinds of threats to look for, and it’s still useful today, Francosky said.

The acronym STRIDE stands for Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service and Escalation of Privilege. These aspects serve as guideposts to help you identify the types of threats you’re looking for.

KORE Wireless offers tool suites to help make IoT security a part of a consistent process.

For the latest news, videos, and podcasts in the IoT Industry, be sure to subscribe to our industry publication.

Follow us on social media for the latest updates in B2B!
Twitter – @MarketScale
Facebook – facebook.com/marketscale
LinkedIn – linkedin.com/company/marketscale

Follow us on social media for the latest updates in B2B!

Image

Latest

virtual simulation
Boxlight’s Virtual Simulation: Exploring Elementary Geometry
January 21, 2025

In today’s digital age, educational technology is transforming the way we approach learning, making it more interactive, engaging, and effective. One such innovative solution is Boxlight’s 3D virtual simulation kits, aiming to revolutionize elementary geometry lessons. A Complementary Path for K-5 Geometry Keeping in mind the K-5 geometry curriculum standards, Boxlight has an extensive…

Read More
Mastering the Essentials of Guest Login in Recruit: A Guide for Educators
January 21, 2025

For educators navigating the realms of modern technology tools, guest login options, particularly in Recruit, have proved to be a valuable resource. While this feature offers ease of access, especially in scenarios where students are transient listeners, like in after-school programs or one-day camps, it’s essential to understand its capabilities and limitations thoroughly. The…

Read More
Polyhedron's Kit
The Art of Kite Building: An Engaging way to Teach Engineering with Composing Polyhedron’s Kit
January 21, 2025

If you’re searching for an educational activity that combines fun, creativity, and scientific learning, look no further: kite building with the Composing Polyhedron’s kite expansion kit is exactly what you need. Learning through Fun – A Unique Approach with Kite Building As the sun shines and summer sets in, it’s time to add a…

Read More
tinkercad
Exploring 3D Design in Early Education with Tinkercad
January 21, 2025

When it comes to nurturing creativity and innovative problem-solving in the classroom, the importance of design-based learning cannot be overstated. And the good news? Even the youngest students can participate in design challenges. The key lies in simplifying the learning process with user-friendly tools, such as Tinkercad’s scribble tool. Starting Simple: The Scribble Tool…

Read More