Slide 1 Slide 2 Slide 3 Slide 4 Slide 5 Slide 6 Slide 7 Slide 8 Slide 9 Slide 10 Slide 11 Slide 12 Product List
IoT Device Security Five Simple Steps Slide 10

Last but not least, there are secure connections. Secure connections have two components. One of those components is actually encrypting the over the air data and the other is appropriate key exchange. Appropriate key exchange must include authentication and authorization upfront to set up that encrypted connection. Why are they both important? Because if the customer does not do the first part right, then the keys are open and anybody can un-encrypt. If the customer is not encrypting, then someone could easily take a peek at the data. However, not all data is created equal, right? Does anyone really care about the temperature sensor data? Well, it turns out that things like IP addresses and port identification may also get sent. If the customer is not securing that whole communication pipe, it leaves it open for an attack.

PTM Published on: 2017-10-23