Security of Things: An Implementers’ Guide to Cyber-Security for Internet of Things Devices and Beyond

Amazon Price: N/A (as of June 24, 2017 09:03 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In this ebook we outline a set of practical and pragmatic cyber security considerations for organisations designing, developing and, testing Internet of Things (IoT) devices and solutions. The purpose is to provide practical advice for consideration as part of the product development life-cycle from concept to after market support.

While IoT products by their very nature encompass many forms of traditional embedded devices and supporting systems, we felt that distilling our knowledge and experience in the specific context of IoT would be useful. A lot of the concepts in this eBook could easily be applied to many other related areas of software and hardware product development.
Continue reading “Security of Things: An Implementers' Guide to Cyber-Security for Internet of Things Devices and Beyond”

A prototype security hardened field device for SCADA systems .

Amazon Price: $69.00 (as of June 24, 2017 17:47 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This thesis describes the development of a prototype security hardened field device (such as a remote terminal unit) based on commodity hardware and implementing a previously developed security architecture. This security architecture has not been implemented in the past due to the difficulty of providing an operating system which meets the architecture's isolation requirements. Recent developments in both hardware and software have made such an operating system possible, opening the door to the implementation and development of this new security architecture in physical devices attached to supervisory control and data acquisition (SCADA) systems. A prototype is developed using commodity hardware selected for similarity to existing industrial systems and making use of the new OKL4 operating system. Results of prototype development are promising, showing performance values which are adequate for a broad range for industrial applications.

Detection and Defeating Distributed Denial of Service (DDoS) Attacks

Amazon Price: N/A (as of June 24, 2017 07:47 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Distributed Denial of Service (DDoS) attack is one of the most disruptive attacks in computer networks. It utilizes legitimate requests from hundreds or thousands of computers to specific targets to occupy targets' bandwidth and deplete targets' resource. In this work, we have attempted to not only mitigate DDoS attacks but also identify the source of attacks even behind Network Address Translation (NAT). This is followed by remedial actions such as denying further access or informing them that they have participated in the attacks.

This report presents a new algorithm to prevent servers from DDoS attacks. This algorithm requires that network routers or gateways collaborate with each other in order to detect suspicious traffic. The algorithm initiates a peer-to-peer communication among network routers or gateways to increase the probability of detecting unwanted traffic. We derive mathematical proofs based on cryptographic concepts such as birthday attacks to estimate the rate of attacks generated and passed along the routers. This implementation is to prevent the attacker from sending spam traffic to the server which can lead to DDoS attacks. The effectiveness of our implementation is evidenced in our experimental results.

Body Hackers: Cyber Murder

Amazon Price: N/A (as of June 25, 2017 00:00 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This book sheds light on a major crime that is under-the-radar. Individuals and groups (known as gangstalkers) are using radio frequency waves and electromagnetic energy to electronically target and harm people. Also known as electronic harassment, this cyber crime is increasing exponentially, and the perpetrators are literally getting away with murder. Harassed individuals, known as targeted individuals (TIs) die of heart attacks, collapse and die with no specific cause, commit suicide, are mis-diagnosed with rare cancers, or labeled as mentally ill. Targeted Individuals (TIs) in society are maligned and isolated. TIs are victimized twice by a society that is not aware of cyber attacks and would have trouble understanding digital murder.This book sheds light on cyber attacks and seeks to stop these crimes. It also provides relief methods for targeted individuals. It specifically asks lawyers, police, coroners, and medical professionals to learn about this crime, learn how to spot it, and help TIs. With public awareness, methods and laws to catch these cyber criminals must be enacted.

Common Computer Security Practices

Amazon Price: $38.95 $38.73 You save: $0.22 (1%). (as of June 24, 2017 11:32 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Computer Security is arguably the most important aspect of modern life – learn all about this interesting and diverse field in this book by award winning author Michael H. Andersen.