Demystifying internet of things security : successful iot device/edge and platform security deployment

In 1989 I walked into the Distributed Systems Laboratory as an undergraduate in the Electrical Engineering department at University of Pennsylvania and it seemed as if I didn’t leave that lab until I received a doctorate 6 years later.Combining compute and communications has been a professional pass...

Full description

Autores:
Tipo de recurso:
Book
Fecha de publicación:
2020
Institución:
Universidad de Bogotá Jorge Tadeo Lozano
Repositorio:
Expeditio: repositorio UTadeo
Idioma:
eng
OAI Identifier:
oai:expeditiorepositorio.utadeo.edu.co:20.500.12010/15923
Acceso en línea:
http://hdl.handle.net/20.500.12010/15923
https://doi.org/10.1007/978-1-4842-2896-8
Palabra clave:
Demystifying internet
Platform security
Economía
Seguridad informática - Normas
Protección de datos
Rights
License
Abierto (Texto Completo)
Description
Summary:In 1989 I walked into the Distributed Systems Laboratory as an undergraduate in the Electrical Engineering department at University of Pennsylvania and it seemed as if I didn’t leave that lab until I received a doctorate 6 years later.Combining compute and communications has been a professional passion ever since as I’ve lead a range of initiatives at Intel Corporation in protecting video and audio content, bring networks and digital technologies into the home, securing compute infrastructure, and preparing for a new generation of distributed applications popularly referred to as the Internet of Things (IoT). IoT’s connection and computerization is a pervasive trend transforming everything we do and the infrastructure which supports us.From smart cities and homes to Industry 4.0, enterprises, critical infrastructure, healthcare, retail, and wearables, vast flows of data, increasingly processed using machine learning algorithms, are altering our existence.This unprecedented scale, pervasiveness, and interconnectivity also creates an environment where the security and integrity of these applications becomes a paramount concern.One only has to look to the headlines where attacks on critical infrastructure such as power generation and distribution, vulnerabilities in our automobiles, and malware in the devices such as webcams, smartphones, and PCs which we bring into our homes, highlight our collective vulnerability. Given the extensive attack surfaces being created and the asymmetry between attackers needing to find a single vulnerability to exploit while defenders have to find and close all vulnerabilities, IoT creates an unmatched set of security challenges.