Presented By:
Now you can earn IEEE Professional Development Hours by attending CEC courses.

The Principles of IoT Security – An Overview

January 30, 2017 to February 03, 2017
Continuing Education Center

Charles J. Lord

Charles J. Lord, PE is an embedded systems consultant and trainer with over 35 years' experience in system design and development in medical, military, and industrial applications. For the last... More

Tens of billions nodes. Millions of terabytes data. The Internet of Things (IoT) holds much promise for helping to automate much of our world as well as making us work smarter and more efficiently. Unfortunately, those billions of nodes and exabytes of data are each a potential security risk that can potentially bring much of the network down and wreak havoc. Therefore, designers of all elements of the IoT need to consider security as part of the design and implementation of the IoT. This week, we will take a look at where the security issues exist and what can be done in the design, test, installation, and maintenance of IoT components to minimize those risks.

February 3 – Day 5: Other Security Issues in the IoT

Now that we have learned the basic challenges of securing the IoT, we will look at the other issues that we may face, including the #1 security weakness in essentially every IoT implementation. We will look at some of the tools and test methods available for IoT security.
February 03, 2017 - 2:00pm EST

February 2 – Day 4: Network Security

In this penultimate class, we will look at the challenges of overall network security. We will cover everything from secure communications protocols to secure commissioning and decommissioning of nodes.
February 02, 2017 - 2:00pm EST

February 1 – Day 3: Data Security

For our third class, we will delve into the security and vulnerabilities of data within the IoT. We will cover issues from the collection and reporting of incorrect or unreliable (“tainted”) data to keeping the data secure and intact as it travels throughout the network and to/from the cloud.
February 01, 2017 - 2:00pm EST

January 31 – Day 2: Hardware Security Challenges

For our second class, we will look at hardware security needs – from code protection to guarding against unauthorized board modification. We will look at many of the features that are being added to high-security microcontrollers in order to meet these challenges
January 31, 2017 - 2:00pm EST

January 30 – Day 1: Intro to IoT Security

In this leadoff class, we will look at the history and structure of the Internet of Things (IoT) and where the known security issues lie. We will look at a couple of examples of recent security breaches and how they could have been prevented. We will also look at the standards and regulatory issues...
January 30, 2017 - 2:00pm EST
Subscribe to The Principles of IoT Security – An Overview