Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Making the Edge Tamper-Proof: Security Challenges and Solutions in Edge Computing

LF Networking via YouTube

Overview

Learn critical edge computing security strategies in this 34-minute conference talk from Erik Nordmark of ZEDEDA. Explore unique security challenges faced in edge computing environments compared to traditional datacenters, focusing on physical access vulnerabilities and supply chain integrity. Discover practical solutions for protecting edge devices from firmware and software attacks, maintaining security with unreliable network connections, and implementing effective supply chain attack prevention. Gain valuable insights from real-world deployments across industries like oil and gas and automotive retail, while understanding how Linux Foundation's EVE-OS specifically addresses edge computing security risks. Master essential security considerations through detailed examination of measured boot remote stations, content inspection proxies, and the three-layer security model, along with guidance on evaluating hardware suppliers and implementing application security measures.

Syllabus

Introduction
Challenges
Oil and Gas
Car Dealers
Security
Project Eve
Tools
Content inspecting proxies
Different perspectives
The three layers
Measured boot remote station
Project summary
Security considerations
Application considerations
App security

Taught by

LF Networking

Reviews

Start your review of Making the Edge Tamper-Proof: Security Challenges and Solutions in Edge Computing

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.