Читать книгу Integration of Cloud Computing with Internet of Things - Группа авторов - Страница 39

2.4.3 Maximize the Power of IoT Access

Оглавление

Often the main objective of ensuring data confidentiality is to achieve this essential objective. Organizations may have a wealth of confidential information, but the data are not widely available to anyone. As regards IoT, there are further attack vector and hence better probability of attack, together with a large number of linked computers. Unauthorized exposure could exploit security vulnerabilities that could lead to physical security risks [28] (Figure 2.2).

Integration of Cloud Computing with Internet of Things

Подняться наверх