Security assessment guidelines for IOT-enabled field applications
發佈日期:2021-09-02 / 文件編號:TAICS TR-0022(E) v1.0
The guidelines formulate information security risk assessments and protection verification procedures for IOT fields, and conduct the information security protection assessments to improve the security protection capability. In order to effectively reveal whether the application fields fulfill the requirements of information security protection, four procedures including Threat Modeling, Vulnerability Testing, Penetration Testing and Impact Analysis for IoT application scenarios are conducted.
The guidelines were supported by National Development Council (NDC), R.O.C..
Download