Iot Securing
Iot Securing
• Fog Computing
• Encryption
• Securing the Internet of Things is a highly necessary and complex task that
sits across the top of its devices, networks and applications, but must be
considered and factored into the design and planning phase.
• Many IoT devices are purposely very small and low powered,
powered and this
increases the difficulty of securing them.
Note: Although you will need to line up solutions with the risks, there is no ‘correct’ answer for the
Note:
‘Impact risk or ‘Likelihood
Impact of risk’ Likelihood of risk event’
event categories – this is an exercise in practicing risk analysis, so
your answer should reflect what you think.
• Microcontroller:
Microcontroller : Encryption, Authentication, password protection. Also relevant are: Use
established security protocols, Hide or physically lock away devices, Keep firmware updated.
• Solenoid valve water release:
release: Threat detection, firewall, Physically lock away or protect device.
• Data in network:
network : Use Fog/edge computing, Authentication, password protect.
• Manager with computer and tool kit:
kit: Hide, physically lock away or protect device or
computer, Authentication, password protection.