Edit This Guide Record
Guides Strategy Securing Devices in the Internet of Things

Securing Devices in the Internet of Things

Published on 05/30/2017 | Strategy

75 0

IoT ONE

Accelerating the Adoption of Industrial Internet of Things.

IoT GUIDE

Security breaches at the device level in the Internet of Things (IoT) can have severe conse- quences, including steep nancial losses, damage to credibility and trust, or even endan- germent of human life. Several high-pro le data compromises illustrate that large-scale breaches typically result from not one but multiple points of failure. Closing any one of these gaps can help mitigate a breach or at least minimize the damage. Yet design- ing security into devices poses different challenges from securing enterprise software or networks.

How can developers know how much security is “just enough” to protect a device with- out hindering performance? Based on a real-world case study, this paper explores the criteria for determining the security requirements of devices connected to IoT infrastruc- tures. It also presents a exible and scalable approach for implementing cost-effective security measures.

 

You can read and download the full report on Wind River here.

test test