*Internet of Things*. Is as a networked interconnection of devices in everyday use that are often equippedwith ubiquitous mechanism.
The Internet of Things (IoT) is based on processing of large amount of data in order to provide useful service. Along with physical objects, the IoT is composed of embedded software, electronics and sensors.
*Security* is defined as a set of mechanisms to protect sensitive data from vulnerable attacks and to guaranteeconfidentiality, integrity and authenticity of data.
****
@ -27,7 +34,7 @@ Lab docs
TIP: To Docker είναι μια πλατφόρμα λογισμικού ανοιχτού κώδικα που υλοποιεί Εικονικοποίηση (Virtualization) σε επίπεδο Λειτουργικού Συστήματος.
@ -35,7 +42,25 @@ TIP: To Docker είναι μια πλατφόρμα λογισμικού ανο
TIP: How It Works, Apps, Swarm: The Five Principles of Swarm Intelligence
== Sec Docs
== Security
[INFO]
====
*Security* is defined as a set of mechanisms to protect sensitive data from vulnerable attacks and to guaranteeconfidentiality, integrity and authenticity of data.
*Network security,* in a cloud environment *(IaaS, PaaS, and SaaS) OR Cloud of Things* consists of the security of the underlying *physical environment* and the *logical security* controls that are inherent in the service or available to be consumed as a service.
- Physical environment security ensures access to the cloud service is adequately distributed, monitored, and protected by underlying physical resources.
- Logical network security controls consists of link, protocol, and application layer services.
In a *cloud environment*, a major part of network security is likely to be provided by virtual security devices and services, alongside traditional physical network devices.
Typically, the inspection and control of network traffic do not pass through physical interfaces where classical control devices can analyze or block them.
This is the reason why effective controls require the integration with the software layer - _network security architecture, security gateways (firewalls, WAF, SOA/API), Security Products (IDS/IPS, Sub Tier Firewall, Security Monitoring and Reporting, Denial of Service (DoS) protection/mitigation, and secure “base services” like DNSSEC and NTP_.
====
=== http://docs.swarmlab.io/SwarmLab-HowTos/labs/sec/ex-1_iptables.adoc.html[Scan and network statistics^]
<p><strong>Internet of Things</strong>. Is as a networked interconnection of devices in everyday use that are often equippedwith ubiquitous mechanism.</p>
</div>
<divclass="paragraph">
<p>The Internet of Things (IoT) is based on processing of large amount of data in order to provide useful service. Along with physical objects, the IoT is composed of embedded software, electronics and sensors.</p>
</div>
<divclass="paragraph">
<p><strong>Security</strong> is defined as a set of mechanisms to protect sensitive data from vulnerable attacks and to guaranteeconfidentiality, integrity and authenticity of data.</p>
</div>
</div>
</div>
</div>
</div>
@ -508,7 +519,7 @@ To Docker είναι μια πλατφόρμα λογισμικού ανοιχτ
</div>
</div>
<divclass="sect1">
<h2id="_iot_docs">2. IoT Docs</h2>
<h2id="_internet_of_things_iot">2. Internet of things (IoT)</h2>
@ -528,8 +539,37 @@ How It Works, Apps, Swarm: The Five Principles of Swarm Intelligence
</div>
</div>
<divclass="sect1">
<h2id="_sec_docs">3. Sec Docs</h2>
<h2id="_security">3. Security</h2>
<divclass="sectionbody">
<divclass="exampleblock">
<divclass="content">
<divclass="paragraph">
<p><strong>Security</strong> is defined as a set of mechanisms to protect sensitive data from vulnerable attacks and to guaranteeconfidentiality, integrity and authenticity of data.</p>
</div>
<divclass="paragraph">
<p><strong>Network security,</strong> in a cloud environment <strong>(IaaS, PaaS, and SaaS) OR Cloud of Things</strong> consists of the security of the underlying <strong>physical environment</strong> and the <strong>logical security</strong> controls that are inherent in the service or available to be consumed as a service.</p>
</div>
<divclass="ulist">
<ul>
<li>
<p>Physical environment security ensures access to the cloud service is adequately distributed, monitored, and protected by underlying physical resources.</p>
</li>
<li>
<p>Logical network security controls consists of link, protocol, and application layer services.</p>
</li>
</ul>
</div>
<divclass="paragraph">
<p>In a <strong>cloud environment</strong>, a major part of network security is likely to be provided by virtual security devices and services, alongside traditional physical network devices.</p>
</div>
<divclass="paragraph">
<p>Typically, the inspection and control of network traffic do not pass through physical interfaces where classical control devices can analyze or block them.</p>
</div>
<divclass="paragraph">
<p>This is the reason why effective controls require the integration with the software layer - <em>network security architecture, security gateways (firewalls, WAF, SOA/API), Security Products (IDS/IPS, Sub Tier Firewall, Security Monitoring and Reporting, Denial of Service (DoS) protection/mitigation, and secure “base services” like DNSSEC and NTP</em>.</p>
</div>
</div>
</div>
<divclass="sect2">
<h3id="_scan_and_network_statistics">3.1. <ahref="http://docs.swarmlab.io/SwarmLab-HowTos/labs/sec/ex-1_iptables.adoc.html"target="_blank"rel="noopener">Scan and network statistics</a></h3>
<divclass="admonitionblock tip">
@ -656,7 +696,7 @@ This tutorial demonstrates some common <strong>nmap</strong> port scanning scena