Читать книгу Fog Computing - Группа авторов - Страница 50

1.5.5.1 Physical Security

Оглавление

Since the fog nodes will be deployed in the wild (e.g. road-side infrastructure in LV-Fog), physical exposure is a more serious threat than in conventional enterprise or cloud computing. The devices need antitamper mechanisms that prevent, detect, and respond to intrusions, while simultaneously considering how to allow maintenance operations without compromising these mechanisms [61].

Fog Computing

Подняться наверх