Comprehensive Security Strategies for IoT Systems: From Devices to Cloud

A detailed overview of securing Internet of Things systems, covering strategies from the device level to cloud integration. This was part of a live Google+ On-Air Hangout held on April 29, 2014.

Comprehensive Security Strategies for IoT Systems: From Devices to Cloud
Siemens Embedded
835 views • May 2, 2014
Comprehensive Security Strategies for IoT Systems: From Devices to Cloud

About this video

Security Strategies for Internet of Things Systems from Devices to the Cloud - A Live Google+ On-Air Hangout on April 29, 2014

Overview

Securing IoT Systems requires examining the security of embedded devices, cloud services and the communication and interactions between IoT devices and cloud services. This panel discussion will review device security including approaches for secure data storage , use of ARM® TrustZone, secure data transmission and connectivity protocols and rugged development for cloud based services. At the end of this discussion you should leave with a complete overview of the security concerns and strategies for the IoT ecosystem that ranges from the end node, to gateways to the cloud services IoT devices connect to.

What You Will Learn

Securing data stored on IoT devices
Using ARM® TrustZone
Securing data transmitted over Bluetooth and Wifi
Authenticating device access to cloud services
Designing rugged and secure cloud services

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

835

Likes

4

Duration

57:42

Published

May 2, 2014

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.