Identifying cyber attacks

Cyber attacks are sometimes disguised as one of the legitimate nodes in a network, which retrieves important information and then suddenly starts attacking the system. Due to the large number of devices, multiple networks, different protocols, and varied working nature of multiple sensors, it becomes difficult to identify when the attack takes place.

We can deploy solutions to monitor all the networks to detect anomalies, check the logs of the communication that takes place between devices and applications, perform penetration testing, identify which devices are compromised, and see what data has been stolen, all in a timely manner. Once we identify the issues, we must apply security patches and updates to avoid ...

Get Internet of Things with Raspberry Pi 3 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.