Читать книгу Integration of Cloud Computing with Internet of Things - Группа авторов - Страница 56

2.8.5 IoT Security Weaknesses

Оглавление

There’s no single IoT security vendor that can provide a full end-to-end security solution. However, some organizations provide more than others and some may provide a full end-to-end IoT security solution in tandem with their partner ecosystem.

Authentication/authorization is one of the biggest issues to tackle in IoT security, followed by access control and data encryption. IoT security respondents didn’t consider firewall, passwords, server security and privacy as a major weakness.

Integration of Cloud Computing with Internet of Things

Подняться наверх