Cloud 101CircleEventsBlog
Register for CSA’s free Virtual Cloud Trust Summit to tackle enterprise challenges in cloud assurance.

Download Publication

Future Proofing the Connected World - Korean Translation
Future Proofing the Connected World - Korean Translation

Future Proofing the Connected World - Korean Translation

Release Date: 02/26/2019

Working Group: Internet of Things

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].

An IoT system is only as secure as its weakest link, this document is our attempt at providing actionable and useful guidance for securing the individual products that make up an IoT system - to raise the overall security posture of IoT products. We hope that this document is found especially useful by those organizations that have begun transforming their existing products into IoT-enabled devices. That is, manufacturers that do not have the background and experience to be aware of the myriad ways that bad guys may try to misuse their newly connected equipment. These manufacturers are often told that there are shortcomings in their security strategy, but have not yet had a good reference guide to help them understand exactly what those shortcomings are and how to fix them. We also hope that those in the startup communities will find this guide useful. Startups in the connected product/system space are challenged with getting their products to market quickly. Finding the right talent to help secure those products early in the development cycle is not an easy task. This document provides a starting point for creating a security strategy that we hope will help mitigate at least the most pressing threats to both consumer and business IoT products. 
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
IoT Controls Matrix v3
IoT Controls Matrix v3
Guide to the IoT Controls Matrix v3
Guide to the IoT Controls Matrix v3
Cybersecurity Best Practices for the Manufacturing Industry
Cybersecurity Best Practices for the Manufactur...
Threats to Water: The Achilles’ Heel of Critical Infrastructure
Threats to Water: The Achilles’ Heel of Critical Infrastructure
Published: 04/08/2024
Defining 12 CSA Research Topics
Defining 12 CSA Research Topics
Published: 02/09/2024
2024 Security Predictions
2024 Security Predictions
Published: 01/12/2024
A Seven Step Approach to IoT Security
A Seven Step Approach to IoT Security
Published: 12/05/2023
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training