Overview
Explore the critical security challenges and solutions for the Internet of Things (IoT) in this 35-minute conference talk from AppSec California 2016. Delve into the four cornerstones of IoT security, learning how they must be adapted for practical and effective implementation in constrained environments. Discover why traditional IT security approaches fall short for IoT devices and why security must be built-in from the start. Examine performance data demonstrating how newer algorithms enable robust security even in resource-limited devices. Gain insights into mitigating a wide range of threats, understanding system architecture, managing security, and building a strong foundation for IoT security from the ground up.
Syllabus
Intro
Why is IoT so important
How security is delivered
Fragmentation
Architecture
Communications
Authentication
Root of Trust
The Reality
Building Security from the Ground Up
Signing to the Next Level
Managing Security
Understanding Your System
Taught by
OWASP Foundation