Published on 05/30/2017 | Strategy
Security breaches at the device level in the Internet of Things (IoT) can have severe conse- quences, including steep nancial losses, damage to credibility and trust, or even endan- germent of human life. Several high-pro le data compromises illustrate that large-scale breaches typically result from not one but multiple points of failure. Closing any one of these gaps can help mitigate a breach or at least minimize the damage. Yet design- ing security into devices poses different challenges from securing enterprise software or networks.
How can developers know how much security is “just enough” to protect a device with- out hindering performance? Based on a real-world case study, this paper explores the criteria for determining the security requirements of devices connected to IoT infrastruc- tures. It also presents a exible and scalable approach for implementing cost-effective security measures.
You can read and download the full report on Wind River here.