Difference between revisions of "IoTSec:Security and Privacy Functionality"

From its-wiki.no

Jump to: navigation, search
m (Josef.Noll moved page Security and Privacy Functionality to IoTSec:Security and Privacy Functionality without leaving a redirect)
(Security, Privacy and Dependability Functionality)
Line 8: Line 8:
 
Link: https://owncloud.unik.no/index.php/apps/files/ajax/download.php?dir=%2F1-Projects%2FIoTSec-IKTPluss&files=SPD-Functionality.xmind
 
Link: https://owncloud.unik.no/index.php/apps/files/ajax/download.php?dir=%2F1-Projects%2FIoTSec-IKTPluss&files=SPD-Functionality.xmind
  
 
+
== Security and Privacy Functionality paragraphs ==
 
1. security management
 
1. security management
 
:1.1. Intrusion detection system
 
:1.1. Intrusion detection system
Line 46: Line 46:
 
::2.1.6. Disable file/ printer sharing
 
::2.1.6. Disable file/ printer sharing
 
::2.1.7. Lock PC when away
 
::2.1.7. Lock PC when away
 +
 
:2.2. IoT hardening
 
:2.2. IoT hardening
  
Line 59: Line 60:
 
::3.4.1. Password-based  authentication
 
::3.4.1. Password-based  authentication
 
:: 3.4.2. Biometric authentication
 
:: 3.4.2. Biometric authentication
::3.4.3. Card or Device
+
::3.4.3. Card or Device authentication
authentication
+
::3.4.4. Digital signature authentication
3.4.4. Digital signature
+
:: 3.5. authorization
authentication
+
 
3.5. authorization
+
 
4. secured communication
 
4. secured communication
 +
:4.1. trusted path (tunnel, VPN)
 +
:4.2. session encryption
 +
:4.3. mutual authentication
  
4.1. trusted path (tunnel, VPN)
+
5. resource management
4.2. session encryption
+
:5.1. upgradability
4.3. mutual authentication
+
::5.1.1. security updates
5. resource managgement
+
:5.2. resource utilisation
 
+
::5.2.1. least privilege
5.1. upgradability
+
:5.3. sec/priv configurability
 
+
::5.3.1. transparency
5.1.1. security updates
+
:5.4. redundancy
5.2. resource utilization
+
:: 5.4.1. continuity
 
+
:5.5. Secure boot
5.2.1. least privilege
+
:5.6. Protection
5.3. sec/priv configurability
+
::5.6.1. Memory
 
+
::5.6.2. Integrity
5.3.1. transparency
+
:5.7. Root of trust
5.4. redundancy
+
:5.8. Protection against
 
+
::5.8.1. Denial of Service (DoS)
5.4.1. continuity
+
::5.8.2. Anti-reply
5.5. Secure boot
+
::5.8.3. Traffic analysis
5.6. Protection
+
 
+
5.6.1. Memory
+
5.6.2. Integrity
+
5.7. Root of trust
+
5.8. Protection against
+
 
+
5.8.1. Denial of Service (DoS)
+
5.8.2. Anti-reply
+
5.8.3. Traffic analysis
+

Revision as of 08:42, 29 March 2017

Security in IoT for Smart Grids
Home Research Security Centre Publications Student corner About
English-Language-icon.png

Security, Privacy and Dependability Functionality

Keywords: Security, Privacy, Dependability, Security Functionality


The page is exported from see File:SPD Functionality.doc

Security, privacy and dependability functionality (Orig:Owncloud)
Link: https://owncloud.unik.no/index.php/apps/files/ajax/download.php?dir=%2F1-Projects%2FIoTSec-IKTPluss&files=SPD-Functionality.xmind

Security and Privacy Functionality paragraphs

1. security management

1.1. Intrusion detection system
1.1.1. Intrusion prevention
1.1.2. Monitoring, Log handling
1.1.3. Auditing
1.2. Policy
1.2.1. Time-out
1.2.2. Data-rate
1.2.3. Backup
1.2.4. Update
1.2.5. Encryption
1.3. user data protection
1.4. physical security
1.4.1. Physical authentication
1.4.2. Physical DoS protection
1.5. certificate handling
1.5.1. digital signature
1.6. accountability
1.6.1. non-repudiation

2. hardening

2.1. PC hardening
2.1.1. Patch Windows/Mac automatically
2.1.2. Strong passwords/ pass phrases
disable unused
user accounts
2.1.3. Anti virus/Anit spyware
2.1.4. Firewall
2.1.5. Do not open
suspicious email
free software (handle with care)
2.1.6. Disable file/ printer sharing
2.1.7. Lock PC when away
2.2. IoT hardening
2.3. Protection against
2.3.1. Electromagnetic interference (EMI)
2.3.2. Electromagnetic Pulse (EMP)

3. access control

3.1. remote access
3.2. Service access control (Firewall)
3.3. identification
3.4. authentication
3.4.1. Password-based authentication
3.4.2. Biometric authentication
3.4.3. Card or Device authentication
3.4.4. Digital signature authentication
3.5. authorization

4. secured communication

4.1. trusted path (tunnel, VPN)
4.2. session encryption
4.3. mutual authentication

5. resource management

5.1. upgradability
5.1.1. security updates
5.2. resource utilisation
5.2.1. least privilege
5.3. sec/priv configurability
5.3.1. transparency
5.4. redundancy
5.4.1. continuity
5.5. Secure boot
5.6. Protection
5.6.1. Memory
5.6.2. Integrity
5.7. Root of trust
5.8. Protection against
5.8.1. Denial of Service (DoS)
5.8.2. Anti-reply
5.8.3. Traffic analysis