Book Image

Learning AWS IoT

By : Agus Kurniawan
Book Image

Learning AWS IoT

By: Agus Kurniawan

Overview of this book

The Internet of Things market increased a lot in the past few years and IoT development and its adoption have showed an upward trend. Analysis and predictions say that Enterprise IoT platforms are the future of IoT. AWS IoT is currently leading the market with its wide range of device support SDKs and versatile management console. This book initially introduces you to the IoT platforms, and how it makes our IoT development easy. It then covers the complete AWS IoT Suite and how it can be used to develop secure communication between internet-connected things such as sensors, actuators, embedded devices, smart applications, and so on. The book also covers the various modules of AWS: AWS Greengrass, AWS device SDKs, AWS IoT Platform, AWS Button, AWS Management consoles, AWS-related CLI, and API references, all with practical use cases. Near the end, the book supplies security-related best practices to make bi-directional communication more secure. When you've finished this book, you'll be up-and-running with the AWS IoT Suite, and building IoT projects.
Table of Contents (14 chapters)
Title Page
Packt Upsell
Contributors
Preface
Index

Understanding IoT risks


Understanding your project's implementation  is crucial to understanding the security risks associated with it. When you decide on an architecture solution for your project, you should understand the pros and cons from your solution. In the security context, if you understand your IoT projects risks, you will be aware of potential threats to your project. One of the potential risks is security. When we talk about security risk, we are talking about security threats. Security threats can originate from two primary sources—humans and nature.

You can find a list of common security threats for IT in general. One of the resources is https://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx. Some security books also provide security threat index for IT. 

After we have identified security threats, we can mitigate the findings. To perform mitigation, it probably requires stakeholders to address the issue. Mitigation from threats should be validated in order to be sure of getting...