Skip main navigation

New offer! Get 30% off one whole year of Unlimited learning. Subscribe for just £249.99 £174.99. T&Cs apply

IoT device design and development

“Smart yet flawed” is the term used by the security software developers when explaining the seriousness of the inherent vulnerabilities of IoT devices. The following table identifies the most common …

IoT devices and lifecycle stages

The Internet of Things is everything that has an on/off switch with a connection to the internet. In the organisational context, these ‘things’ often actually form part of safety-critical infrastructure …

IoT security issues

IoT applications are growing, but security for IoT projects and deployments remain a major obstacle for both organisations and users. These obstacles include: trusting the identity of the IoT device …

Key IoT development stages

In practical terms, IoT devices go through three key development stages: from the manufacture of the specialised control processors to the delivery of the finished device to the user. These …

IoT and Security by Design

The Internet of Things (IoT) refers to the devices or instruments with sensing capability and contextual awareness that are interconnected using the Internet. They collect data, without human intervention, to …

An overview of Security by Design principles

In this era of instant connectivity, our world is increasingly saturated with a wide range of software products and services, and technology devices that are run and managed through firmware. …

Week 2 resources

You may find the resources mentioned in Week 2 of the course useful to learn more about the concepts you have been introduced to this week. These resources are included …

The confidentiality, integrity and availability triad

“Security professionals evaluate threats and vulnerabilities based on the potential impact they have on the confidentiality, integrity, and availability of an organization’s assets—namely, its data, applications, and critical systems.” (F5 …

CIA triad principles in action

Let’s examine how a real-life scenario involving a ransomware attack can be applied and explained to determine targeted precautionary security measures. Watch this video to learn more: This is an …

Human-centric security design: U3 concept

The U3 (user, usage, and usability) concept is an academic, research-based approach to security design. Human-centric cyber security is an intangible concept that is difficult to define because of the …

NCSC cyber security design principles

The UK’s National Cyber Security Centre (NCSC) advocates Security by Design that goes beyond individual applications and that ensures networks, systems, technologies, and products are all designed and built securely …

IoT device disposal

Disposing of IoT devices (by discarding or selling them) may give other people easy access to personal and sensitive information. The Australian Cyber Security Centre provides useful information for securing …

Design challenges

What are the major challenges associated with designing IoT applications that are inherently secure? Did you know that access to many security cameras is not effectively secured and that livestreams …