It is nearly impossible to discuss practical aspects of threat, vulnerability, and risk without identifying the essential components of Information Assurance (IA), an important subdomain of IoT security. Succinctly, they are as follows:
- Confidentiality: Keeping sensitive information secret and protected from disclosure
- Integrity: Ensuring that information is not modified, accidentally or purposefully, without being detected
- Authentication: Ensuring that the source of data is from a known identity or endpoint (generally follows identification)
- Non-repudiation: Ensuring that an individual or system cannot later deny having performed an action
- Availability: Ensuring that information and capabilities ...