Linkedin Mail RSS Skype Telegram Twitter WhatsApp
  • Quantum
  • AI
  • AI Security
  • Society 5.0
  • Cyber-Kinetic
  • 5G
  • Smart Cities
  • Blockchain & Crypto
  • Other
Search
Marin Ivezic Marin Ivezic Marin Ivezic
  • Quantum
  • AI
  • AI Security
  • Society 5.0
  • Cyber-Kinetic
  • 5G
  • Smart Cities
  • Blockchain & Crypto
  • Other
Linkedin Mail RSS Skype Telegram Twitter WhatsApp
  • Home
  • About
  • My Books
    • Securing Society 5.0
    • The Future of Leadership in the Age of AI
    • Crypto & Blockchain Security
    • Cyber-Kinetic Security
  • Resources
    • Internet of Things (IoT) Wireless Protocols
    • Emerging Tech Security Guidelines, Frameworks, Standards
    • Timeline of Key Cyber-Kinetic Attacks, Incidents & Research
  • Contact
Sign in
Welcome! Log into your account
Forgot your password? Get help
Password recovery
Recover your password
A password will be e-mailed to you.
Home Frameworks OWASP – Principles of IoT Security
  • Frameworks
  • IoT General

OWASP – Principles of IoT Security

By
Marin Ivezic
-
May 14, 2016

Share via:

  • More
OWASP-–-Principles-of-IoT-Security

Organization: Open Web Application Security Project (OWASP)

Reference: Principles of IoT Security

Published on: 14 May 2016

16 high-level principles of IoT security.

OWASP-–-Principles-of-IoT-Security
  • TAGS
  • GUIDELINES
  • NEWS
Previous articlePlatform Industrie 4.0 – Secure Identities
Next articleATT – The CEO’s Guide to Securing the Internet of Things
Marin Ivezic

RELATED ARTICLESMORE FROM AUTHOR

ENISA Baseline Security Recommendations for IoT

ENISA – Baseline Security for IoT

IoTAA - Internet of Things Security Guidelines

IoTAA – IoT Security Guidelines

GSMA IoT Security Guidelines

GSMA – IoT Security Guidelines (V2.0)

Connect with me

Twitter
Amazon
LinkedIn
Medium
RSS
Telegram

Most popular articles this week

IEMI

IEMI – Threat of Intentional Electromagnetic Interference

April 30, 2018
AI Future

AI Is Neither the End of Civilization nor the Beginning of...

February 6, 2018
Robot Uncontrollable AI Cyber-Kinetic

The Dual Risks of AI Autonomous Robots: Uncontrollable AI Meets Cyber-Kinetic...

April 7, 2024
Cyber-Kinetic Security, IoT Security, OT Security

The World of Cyber-Physical Systems & Rising Cyber-Kinetic Risks

March 31, 2015
US vs China 5G

Geopolitics of 5G and 5G-Connected Massive & Critical IoT

April 1, 2019
5G Critical Infrastructure

5G Critical Infrastructure – the Most Critical of All

April 9, 2019
5G SBA IMS MEC Architecture

Introduction to 5G Core Service-Based Architecture (SBA) Components

August 16, 2020
Quantum Computer 5G Security

The Quantum Computing Threat

November 4, 2019
Securing Society 5.0 Introduction

Securing Society 5.0 – Overcoming the hidden threats in society’s greatest...

May 17, 2021
Chief AI Security Officer CAISO

Why We Seriously Need a Chief AI Security Officer (CAISO)

September 20, 2023
Introducing Society 5.0

Introducing Society 5.0

April 19, 2022
Safe Secure Responsible Trustworthy AI

Addressing the Full Stack of AI Concerns: Responsible AI, Trustworthy AI,...

August 24, 2024
Practical Steps Quantum

Ready for Quantum: Practical Steps for Cybersecurity Teams

November 1, 2021
5G Opportunity and Cybersecurity

Opportunity and Cybersecurity in the Age of 5G

January 19, 2020
AI Risks

Risks of AI – Meeting the Ghost in the Machine

May 4, 2019
AI Security

AI Security 101

September 20, 2023
5G Network Slicing

5G Network Slicing Technology: A Primer

March 25, 2019
Statement on AI Risk

Marin’s Statement on AI Risk

December 29, 2023
AI Fake News

AI-Exacerbated Disinformation and Cyber Threats to Democracy

March 15, 2019
Stuxnet Cyber-Physical Weapon

Stuxnet and the Birth of Cyber-Kinetic Weapons

January 11, 2018
Quantum Resilience Quantum Processor

Q-Day Predictions: Anticipating the Arrival of Cryptanalytically Relevant Quantum Computers (CRQC)

July 27, 2023
Smart City 5G Privacy

Cyber-Kinetic Security and Privacy Threats in Smart Cities

March 20, 2019

Tags

OPINION (118)CYBERSECURITY (59)TECHNICAL (54)5G (42)CYBER-KINETIC SECURITY (39)GUIDELINES (37)IOT (36)AI (24)CYBER-PHYSICAL SYSTEMS (22)QUANTUM (19)LEADERSHIP (18)SMART CITY (14)FINANCIAL CRIME (12)FRAMEWORKS (11)5G SECURITY BOOK (10)REFERENCE ARCHITECTURE (9)INNOVATION (9)SOCIETY 5.0 BOOK (9)PRIVACY (8)LEADERSHIP AI BOOK (8)IIoT (8)SOCIETY (7)GEOPOLITICS (7)LPWAN (7)CYBER-KINETIC SECURITY BOOK (6)CANADA (5)INTERIM MANAGEMENT (4)DIVERSITY AND INCLUSION (4)ECONOMY (3)STANDARD (3)SOCIETY 5.0 (3)ZIGBEE (2)LoRaWAN (2)VIRTUALIZATION (2)REGULATION (2)BLUETOOTH (2)O-RAN (2)RFID (2)OPENRAN (2)ORAN (2)NFC (2)Neurodiversity (1)FOG (1)4IR (1)TSN (1)WIFI (1)
Marin Ivezic
ABOUT US
Marin Ivezic's personal blog with guest contributors on security, safety, privacy and controllability of emerging technologies such as AI, IoT, Blockchain, Metaverse, and others.
FOLLOW US
Linkedin Mail RSS Skype Telegram Twitter WhatsApp
  • Home
  • About
  • My Books
    • Securing Society 5.0
    • The Future of Leadership in the Age of AI
    • Crypto & Blockchain Security
    • Cyber-Kinetic Security
  • Resources
    • Internet of Things (IoT) Wireless Protocols
    • Emerging Tech Security Guidelines, Frameworks, Standards
    • Timeline of Key Cyber-Kinetic Attacks, Incidents & Research
  • Contact
© Marin Ivezic | Terms of Use | Privacy Policy
Share via
Facebook
X (Twitter)
LinkedIn
Mix
Pinterest
Tumblr
Skype
Buffer
Pocket
VKontakte
Parler
Xing
Reddit
Line
Flipboard
MySpace
Delicious
Amazon
Digg
Evernote
Blogger
LiveJournal
Baidu
MeWe
NewsVine
Yummly
Yahoo
WhatsApp
Viber
SMS
Telegram
Facebook Messenger
Like
Email
Print
Copy Link
Powered by Social Snap
Copy link
CopyCopied
Powered by Social Snap