![]() As we place devices that have never been connected to the internet, as good citizens, we are accountable for designing them. As architects, we are responsible for understanding the IoT stack of technologies and securing them. Exploits, damage, and rogue agents have already been developed, deployed, and spread globally, disrupting countless businesses, networks, and lives. ![]() There are currently billions of devices, and the double-digit growth of connecting the analog world to the internet also forms the largest attack surface on Earth. The first chapter of this book revealed the size, growth, and potential of the Internet of Things ( IoT ). Software-defined perimeter and blockchainĪdapted from Internet of Things for Architects, by Perry Lea.We present this chapter as a series of installments including: In Chapter 12 of his book, Internet of Things for Architects, Perry Lea offers a detailed discussion of key fundamentals of IoT security.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |