Comprehensive Security Strategies for IoT Systems: From Devices to Cloud

A detailed overview of securing Internet of Things systems, covering strategies from the device level to cloud integration. This was part of a live Google+ On-Air Hangout held on April 29, 2014.

Siemens Embedded835 views57:42

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in South Korea under the topic 'cybersecurity news today'.

About this video

Security Strategies for Internet of Things Systems from Devices to the Cloud - A Live Google+ On-Air Hangout on April 29, 2014 Overview Securing IoT Systems requires examining the security of embedded devices, cloud services and the communication and interactions between IoT devices and cloud services. This panel discussion will review device security including approaches for secure data storage , use of ARM® TrustZone, secure data transmission and connectivity protocols and rugged development for cloud based services. At the end of this discussion you should leave with a complete overview of the security concerns and strategies for the IoT ecosystem that ranges from the end node, to gateways to the cloud services IoT devices connect to. What You Will Learn Securing data stored on IoT devices Using ARM® TrustZone Securing data transmitted over Bluetooth and Wifi Authenticating device access to cloud services Designing rugged and secure cloud services

Video Information

Views
835

Total views since publication

Likes
4

User likes and reactions

Duration
57:42

Video length

Published
May 2, 2014

Release date

Quality
hd

Video definition

Tags and Topics

This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:

Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.