Examine the many security building blocks offered in the Internet of Things (IoT) platforms based on Intel Architecture (IA) to dispel common misconceptions about the IoT.
The threat pyramid, secure boot, chain of trust and the SW stack prior to defense-in-depth are all covered in this free access book. It offers an overview of various security solutions and clarifies matters for industry professionals.
Intel has the CPU and Isolated Security Engine capabilities to make it easier to deploy security in the IoT, which offers special problems. This book examines the difficulties in protecting these devices so that they are resistant to various threats coming from both inside and outside the network. There is no one universal technique for implementing security because the requirements and robustness standards to secure the assets vary widely.
What You'll Discover: How to protect devices by securing them against various threats coming from both inside and outside the network.
Learn about the many security building pieces that are offered by IoT platforms based on the Intel Architecture (IA).
Know the software stack, secure boot, chain of trust, and threat pyramid before the defense
-in-depth