The Security We Need - Designing Usable IoT Security

The Security We Need - Designing Usable IoT Security

OWASP Foundation via YouTube Direct link

Implement Runtime Anomaly Detection & Device Health Checks

14 of 19

14 of 19

Implement Runtime Anomaly Detection & Device Health Checks

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

The Security We Need - Designing Usable IoT Security

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 A little About Me
  3. 3 Learning Objectives
  4. 4 Security Intricacies Don't Make Sense To Users - Type 1
  5. 5 Security is Not Interesting to the Regular User
  6. 6 Barriers to Necessary Workflow
  7. 7 Differing Views of Security
  8. 8 Put on your "User" Hat
  9. 9 P2: Secure Defaults Only ctd.
  10. 10 Display Targeted Risk Information for Security Config
  11. 11 Assist your User with Pre-configured Security Levels
  12. 12 Design to Scale (Zero-Touch Device Provisioning Example)
  13. 13 Do Not Allow Passive or Transitive Authorization
  14. 14 Implement Runtime Anomaly Detection & Device Health Checks
  15. 15 Ensure lot Admins Can Seamlessly Revoke Previously Granted Authority Ctd.
  16. 16 Just Keep Secrets Secret
  17. 17 Monitor Circumvention of Security Controls
  18. 18 In closing, Aim for Clarity & Simplicity
  19. 19 My Social Networking

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.