We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Peeling the Layers of Security for IoT Applications

00:00

Formal Metadata

Title
Peeling the Layers of Security for IoT Applications
Title of Series
Number of Parts
17
Author
License
CC Attribution - NonCommercial - ShareAlike 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal and non-commercial purpose as long as the work is attributed to the author in the manner specified by the author or licensor and the work or content is shared also in adapted form only under the conditions of this
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Many of the things we use on a daily basis are becoming smart and connected. The Internet of Things or IoT, will improve our lives by helping us reach our fitness goals, reduce resource consumption, increasing productivity, and track and secure our assets. Many embedded developers realize the potential benefits of the IoT and are actively developing various applications, from connected home devices to wearables to home security systems. However, along with these benefits come risks. No one wants to design an application that’s prone to hacking or data theft. Undesirable events like high-profile hacks can lead to serious brand damage and loss of customer trust, and worst-case slow down or permanently reduce the adoption of IoT. This session explores some of the most common security pitfalls in embedded applications – and how to avoid them.
Software developerEvent horizonInformation securityBitException handlingSlide ruleInternet der DingeCartesian coordinate systemAngleHacker (term)Information securityGroup actionGrass (card game)Dependent and independent variablesPoint (geometry)Different (Kate Ryan album)Computer clusterSound effectField (computer science)Proper mapComplex (psychology)Principal idealVideoconferencing
Software developerEvent horizonQuantum cryptographyPrototypeInformation securitySurfaceComputer hardwareTelecommunicationCommunications protocolPhase transitionSlide ruleHacker (term)PasswordPrototypeBoom (sailing)BitInformation privacyCartesian coordinate systemSurfacePhysical systemComputer hardwareMultiplication signFocus (optics)TelecommunicationOpticsFiber (mathematics)Software testingVapor barrierPoint (geometry)Personal identification numberSoftware developerGame controllerPower (physics)Communications protocolProjective planeMoment (mathematics)Pulse (signal processing)Hecke operatorCybersexInterface (computing)Electronic mailing listLevel (video gaming)Open setSystem callCASE <Informatik>GoogolInformation securityVermaschtes NetzSoftwareTime zoneSingle-precision floating-point formatRemote administrationDifferent (Kate Ryan album)AuthenticationElectric power transmissionResultantEmailVideo gameNeuroinformatikConnected spacePlastikkarteDisk read-and-write headTraffic reportingLogicTerm (mathematics)Tracing (software)RiflingServer (computing)Expert systemProcess (computing)Service (economics)EncryptionWireless LANTorusScripting languageRevision controlFreewareOffice suiteNatural numberGame theorySoftware protection dongleMereologySemiconductor memoryQuantumOvalHypermediaKey (cryptography)Wave packetData storage deviceComplex systemWordArithmetic meanDevice driverPoint cloudRouter (computing)Arithmetic progressionMenu (computing)Proper mapInternetworkingRoutingInstance (computer science)Context awarenessForcing (mathematics)19 (number)Quantum cryptographyInternet der DingeRoboticsSet (mathematics)Gateway (telecommunications)Product (business)Identity managementDialectState of matterRootDemosceneSign (mathematics)CryptographyPhase transitionOperator (mathematics)Antivirus softwareMathematicsMIDISelf-organizationThermische ZustandsgleichungFlash memoryComputer configurationMultilaterationWeb 2.0Mobile appMeeting/InterviewComputer animation
Transcript: English(auto-generated)