Главная
Study mode:
on
1
Intro
2
About Marta
3
Experiences come from
4
When you search for loT security challenges.....
5
Looking deeper
6
Solutions? Defence in depth
7
Remove unneeded dependencies (1)
8
Restrict remote access (1)
9
Use tested crypto libraries (1)
10
Add logging/audit (1)
11
Perform device updates
12
Summary
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Learn essential IoT security practices in this 38-minute conference talk from Eclipse Foundation's Marta Rybczynska, who presents five practical steps to enhance device security. Explore common IoT security challenges and implement a defense-in-depth strategy through key measures including dependency management, remote access restrictions, cryptographic library implementation, logging and audit procedures, and device update protocols. Gain valuable insights from real-world experiences and discover how to effectively protect IoT devices from potential security threats using tested methodologies and best practices.

5 Easy Steps for More Secure IoT

Eclipse Foundation
Add to list