A modular framework for auditing IoT devices and networks

S Rizvi, T Zwerling, B Thompson, S Faiola… - Computers & …, 2023 - Elsevier
In recent years, we have seen significant growth in the use of IoT devices as part of
conventional enterprise networks to increase the operations, services, and functionality of …

A case for IoT security assurance

CA Ardagna, E Damiani, J Schütte… - Internet of Everything …, 2018 - Springer
Today the proliferation of ubiquitous devices interacting with the external environment and
connected by means of wired/wireless communication technologies points to the definition …

An auditing framework for vulnerability analysis of IoT system

I Nadir, Z Ahmad, H Mahmood, GA Shah… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
Introduction of IoT is a big step towards the convergence of physical and virtual world as
everyday objects are connected to the internet nowadays. But due to its diversity and …

Verifying and monitoring iots network behavior using mud profiles

A Hamza, D Ranathunga… - … on Dependable and …, 2020 - ieeexplore.ieee.org
IoT devices are increasingly being implicated in cyber-attacks, raising community concern
about the risks they pose to critical infrastructure, corporations, and citizens. In order to …

A Review of IoT Firmware Vulnerabilities and Auditing Techniques

T Bakhshi, B Ghita, I Kuzminykh - Sensors, 2024 - mdpi.com
In recent years, the Internet of Things (IoT) paradigm has been widely applied across a
variety of industrial and consumer areas to facilitate greater automation and increase …

[PDF][PDF] Providing tamper-resistant audit trails with distributed ledger based solutions for forensics of iot systems using cloud resources

M Westerlund, M Neovius, G Pulkkis - International Journal on …, 2018 - researchgate.net
Network and information security are often more challenging for current IoT systems than for
traditional networks. Cloud computing resources used by most IoT systems are publicly …

[图书][B] Auditing IT infrastructures for compliance

M Weiss, MG Solomon - 2015 - books.google.com
The Second Edition of Auditing IT Infrastructures for Compliance provides a unique, in-depth
look at recent US based Information systems and IT infrastructures compliance laws in both …

[图书][B] IT auditing: Using controls to protect information assets

JA Hall - 2011 - hkicpa.org.hk
Edition explains, step by step, how to implement a successful, enterprise-wide IT audit
program. New chapters on auditing cloud computing, outsourced operations, virtualization …

[图书][B] Cyber-assurance for the Internet of Things

TT Brooks - 2017 - books.google.com
Presents an Cyber-Assurance approach to the Internet of Things (IoT) This book discusses
the cyber-assurance needs of the IoT environment, highlighting key information assurance …

A security architecture for networked internet of things devices

F Ye, Y Qian - GLOBECOM 2017-2017 IEEE Global …, 2017 - ieeexplore.ieee.org
The Internet of Things (IoT) increasingly demonstrates its role in smart services, such as
smart home, smart grid, smart transportation, etc. However, due to lack of standards among …