Steps to Implementing Security by Design for IoT

 

IoT security by design might seem like a buzzword in that it’s not well-defined in the consumer landscape, but KORE Wireless’s Chris Francosky said the most effective security measures are put in place well before production even begins.

Host Shelby Skrhak sat down with Francosky on this episode of the Industrial IoT podcast, brought to you by MarketScale.

“I’m evangelizing this idea of a five-step process centered around threat modeling, which is at the heart of security by design,” Francosky said.

5 Step Process for Threat Modeling

  1. Define your assets – not only devices, but the data, as well.
  2. Decompose that application through an architecture diagram so you can see clearly how the application is broken up.
  3. Look at each area of the decomposed application and identify threats.
  4. Document threats.
  5. Rate and prioritize threats

How do you recognize threats? In the late 1990s, Microsoft devised an acronym that summarizes the kinds of threats to look for, and it’s still useful today, Francosky said.

The acronym STRIDE stands for Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service and Escalation of Privilege. These aspects serve as guideposts to help you identify the types of threats you’re looking for.

KORE Wireless offers tool suites to help make IoT security a part of a consistent process.

For the latest news, videos, and podcasts in the IoT Industry, be sure to subscribe to our industry publication.

Follow us on social media for the latest updates in B2B!
Twitter – @MarketScale
Facebook – facebook.com/marketscale
LinkedIn – linkedin.com/company/marketscale

Follow us on social media for the latest updates in B2B!

Image

Latest

data-driven tools
Leverage Data-Driven Tools and Local SEO for Maximum Search Engine Rankings
July 26, 2024

As businesses continue to navigate the digital landscape, data-driven tools are more crucial than ever for effective SEO strategies. Understanding and implementing the proper SEO practices can make a significant difference with evolving algorithms and competitive markets. Given that 75% of users never scroll past the first page of search results, this statistic underscores…

Read More
On-device AI
On-Device AI is Today’s Tech Innovation, Competition and Market Leadership Driver
July 26, 2024

On-device AI revolutionizes the tech landscape, making it a critical factor for industry dominance. This cutting-edge technology directly integrates advanced AI capabilities into devices, transforming consumer and enterprise applications. This shift stems from the need for improved performance, reduced latency, enhanced data privacy & security, and personalized user experiences. With advancements in neural processing…

Read More
modern supply chains
The Role of AI in Modern Supply Chains: Insights from Aaron Hatfield at Arvist
July 26, 2024

Artificial intelligence rapidly transforms modern supply chains, with companies like Arvist leading the charge. In a recent episode of Hammer Down, hosted by Mike Bush, Aaron Hatfield, the Head of Sales at Arvist, sheds light on AI’s practical applications and benefits in enhancing supply chain operations. Is AI in the supply chain a double-edged…

Read More
semiconductor manufacturing
Training New Semiconductor Manufacturing Professionals is Key to Meet Coming Domestic Manufacturing Demand
July 26, 2024

Over the past few years, the U.S. has made significant strides in semiconductor manufacturing, driven by substantial investments and strategic policies. With the CHIPS Act expected to triple domestic semiconductor manufacturing capacity by 2032, the need for a skilled workforce is more urgent than ever. This discussion explores the key question: What does the…

Read More