Главная
Study mode:
on
1
Intro
2
Why is IoT so important
3
How security is delivered
4
Fragmentation
5
Architecture
6
Communications
7
Authentication
8
Root of Trust
9
The Reality
10
Building Security from the Ground Up
11
Signing to the Next Level
12
Managing Security
13
Understanding Your System
Description:
Explore the critical security challenges and solutions for the Internet of Things (IoT) in this 35-minute conference talk from AppSec California 2016. Delve into the four cornerstones of IoT security, learning how they must be adapted for practical and effective implementation in constrained environments. Discover why traditional IT security approaches fall short for IoT devices and why security must be built-in from the start. Examine performance data demonstrating how newer algorithms enable robust security even in resource-limited devices. Gain insights into mitigating a wide range of threats, understanding system architecture, managing security, and building a strong foundation for IoT security from the ground up.

IoT Cornerstones of Security

OWASP Foundation
Add to list
0:00 / 0:00