CHANNELS

Subscribe to the InfoTech eNewsletter

infoTECH News

TMCNet:  Machine-to-Machine (M2M) Security and Privacy Report 2014-2020 - The Challenges and Opportunities

[August 19, 2014]

Machine-to-Machine (M2M) Security and Privacy Report 2014-2020 - The Challenges and Opportunities

(M2 PressWIRE Via Acquire Media NewsEdge) Dublin - Research and Markets (http://www.researchandmarkets.com/research/pjkg9p/machinetomachine) has announced the addition of the "Machine-to-Machine (M2M) Security and Privacy: Challenges and Opportunities" report to their offering.

Machine-to-Machine (M2M) applications will be developed in various sectors of the industry at a rapid pace over the next five years, reaching an inflexion point by 2020 as the Internet of Things (IoT) begins a high growth phase. With increasingly more devices connected to the Internet in which critical business processes depend, the threats to applications increase in terms of incidence, severity, and impact.

It is important to recognize that applications are susceptible to physical attacks on devices as well as network-level attacks, which in many cases have different issues and solutions. The M2M industry is quickly recognizing the need to deal with security and privacy issues pertaining to M2M, but understanding the specific issues and solutions are not broadly understood.

Key Topics Covered: Part One: Machine-To-Machine Security 1. Exploited Vulnerabilities And Attacks 2. Security Requirements For M2M 3. Factors Leading To Complexity In M2M Applications 4. Measures To Ensure Security For M2M Applications 5. Two Points Of Attack On M2M Communications 6. Difference In M2M Communication Over Gsm And Cdma 7. Critical Device Controls By M2M Applications 8. Security An Integral Part Of Application Design 9. Sophisticated Security Mechanisms For M2M Security 10. Evolving Elements Of Security 11. Security Is One Of Many Go-To-Market Factors 12. Securing The Communications And Not Just Devices 13. Use Of Ipv6: Added Security Problems 14. Adequate Use Of Certificate For Security 15. Special Skill-Set Required For Deploying Security Tools 16. Organizations And Collaborations For Standards Part Two: Machine-To-Machine Privacy 17. Privacy Concerns 18. Privacy And Security Concerns For Big Data 19. Privacy Issues In Cloud Computing 20. Privacy An Integral Part Of Application Design Part Three: Industry Views On Security 21. Industry Survey On Security Part Four: Wireless Sensor Networks 22. Introduction To Wireless Sensor Networks 23. Security Threats On Osi Layers For Wsn 24. Security Goals Of Wireless Sensor Networks 25. Challenges For Wireless Sensor Networks 26. Types Of Attacks In Sensor Networks 27. Security Mechanisms To Combat Active And Passive Attacks 28. Sensor Network Standardization 29. Conclusions For more information visit http://www.researchandmarkets.com/research/pjkg9p/machinetomachine CONTACT: Research and Markets, Laura Wood, Senior Manager.

press@researchandmarkets.com Fax from USA: 646-607-1907 Fax from rest of the world: +353-1-481-1716 Sector: Telecommunications and Networks (http://www.researchandmarkets.com/categories.asp?cat_id=20&campaign_id=pjkg9p), IT Security (http://www.researchandmarkets.com/categories.asp?cat_id=42&campaign_id=pjkg9p) .

(c) 2014 M2 COMMUNICATIONS

[ InfoTech Spotlight's Homepage ]


blog comments powered by Disqus

FOLLOW US

Subscribe to InfoTECH Spotlight eNews

InfoTECH Spotlight eNews delivers the latest news impacting technology in the IT industry each week. Sign up to receive FREE breaking news today!
FREE eNewsletter