Главная
Study mode:
on
1
Introduction
2
Challenges
3
Oil and Gas
4
Car Dealers
5
Security
6
Project Eve
7
Tools
8
Content inspecting proxies
9
Different perspectives
10
The three layers
11
Measured boot remote station
12
Project summary
13
Security considerations
14
Application considerations
15
App security
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Learn critical edge computing security strategies in this 34-minute conference talk from Erik Nordmark of ZEDEDA. Explore unique security challenges faced in edge computing environments compared to traditional datacenters, focusing on physical access vulnerabilities and supply chain integrity. Discover practical solutions for protecting edge devices from firmware and software attacks, maintaining security with unreliable network connections, and implementing effective supply chain attack prevention. Gain valuable insights from real-world deployments across industries like oil and gas and automotive retail, while understanding how Linux Foundation's EVE-OS specifically addresses edge computing security risks. Master essential security considerations through detailed examination of measured boot remote stations, content inspection proxies, and the three-layer security model, along with guidance on evaluating hardware suppliers and implementing application security measures.

Making the Edge Tamper-Proof: Security Challenges and Solutions in Edge Computing

LF Networking
Add to list