Click here to Skip to main content
15,887,135 members
Articles / Internet of Things

Internet of Things Security Architecture

26 Sep 2016CPOL25 min read 18.9K   7  
The objective of threat modeling is to understand how an attacker might be able to compromise a system and then make sure appropriate mitigations are in place. Threat modeling forces the design team to consider mitigations as the system is designed rather than after a system is deployed.

This article is in the Product Showcase section for our sponsors at CodeProject. These articles are intended to provide you with information on products and services that we consider useful and of value to developers.

Views

Daily Counts

License

This article, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)


Written By
United States United States
Yuri Diogenes is a Senior Content Developer at CSI Enterprise Mobility and Security Team, with focus on EMS Solutions, Azure Security Center and OMS Security. Prior to work on this team he worked as a Writer for the Windows Security Team and Support Escalation Engineer at CSS Forefront Team also at Microsoft. Yuri has a Master of Science Degree in Cybersecurity Intelligence & Forensics at UTICA College and MBA at FGF in Brazil. Some of the IT industry certifications that he currently holds are CISSP, E|CEH, E|CSA, CompTIA, Security+, CompTIA Cloud Essentials Certified, CompTIA Mobility+, CompTIA Network+, CompTIA Cloud+, CASP, MCSE and MCTS.

Comments and Discussions