Learn how to calculate risk on attributes in order to develop a comprehensive IoT risk posture.
- [Instructor] Traditional IT systems…take a monolithic approach to security,…which is based on auditing,…using controlled design more than 25 years ago.…This hardly addresses the current cybersecurity demands…and is quite unsuitable for use…as the basis of security and trust in the IOT.…The use of enterprise security controls has not served well…in the industrial control system sector,…where the quite different demands of continuous operation…are incompatible with routine patching and restarts.…Similarly, it's unlikely that a home light bulb…will continuously check for patches, apply updates,…and monitor for cyber attack.…
A new security paradigm is required.…The evolution of the IOT requires an approach…to security and privacy which is agile…and adapts to unforeseen changes.…It requires an approach which recognizes a global ecosystem,…complaint with high-level principles but implemented…with a sector-specific interpretation of security.…Traditionally in IT, there have always been two directions…from which to approach security.…
- Designing an enterprise architecture
- Architecting security
- Designing IoT security
- Domain specific architectures
- Proximity network services
- IoT application services
- Revised conceptual architecture
Skill Level Intermediate
1. Enterprise Architecture
2. Designing IoT Security
3. Domain Specific Architectures
4. Proximity Network Services
5. Application Tier Services
6. Revised Conceptual Architecture
Bringing it all together4m 48s
What's next1m 16s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.