Index
Symbols
- 5G wireless networking, Connection to Other Computers
A
- access control hygiene, Policy tools
- access policies, Policy tools
- acknowledgments, Acknowledgments
- AES algorithm, Symmetric Cryptography
- airplanes (see also autonomous vehicles)
- Airbus A320 passenger jets, Fear of the A320
- impact of IoT on, Airplanes
- ambiguity, The Somewhat Impossible
- analytics, The Backend
- Anderson, R., Beyond Bits
- anti-patterns
- authentication
- default credentials, Instance: Default Credentials
- easy exposure, Instance: Easy Exposure
- insufficient, Instance: No Authentication
- IoT challenges, Anti-Pattern: Authentication Blunders
- lack of, Instance: No Authentication
- no delegation, Instance: No Delegation
- permanent credentials, Instance: Permanent Credentials
- coding blunders, Anti-Pattern: Coding Blunders
- cryptography
- aging of, Instance: Aging of Cryptography and Protocols
- bad PKI, Instance: Bad PKI
- bad randomness, Instance: Bad Randomness
- common keys, Instance: Common Keys
- protection provided by, Anti-Pattern: Cryptography Blunders
- doing too much
- differential parsing, Instance: Differential Parsing
- excess power, Instance: Excess Power
- input validation failures, Anti-Pattern: Doing Too Much
- authentication
- architectures (see IoT architectures)
- Ashton, Kevin, What’s Different?
- asymmetric cryptography, Public Key Cryptography
- attribute certificates, Public Key Infrastructure, Ontologies of Association
- authentication
- anti-patterns, Anti-Pattern: Authentication Blunders-Moving Forward
- vs. authorization, Authorization
- cryptographic toolkit, newer
- blockchains ...
Get The Internet of Risky Things now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.