What’s Required To Secure The IoT?
Citrix Labs is continuing to research the impact of the Internet of Things on our customers. We’d like to hear from you! Please take our IoT survey and register for our IoT and Security webinar.
This article is a continuation of a series posts about the Internet of Things from the perspective of the Citrix Labs research and development organization. The series started with a discussion about the intersection of the IoT and the Enterprise to create a software-defined workplace. In the next post we presented important security challenges to consider when contemplating the influx of connected devices of every size and description into the enterprise. Today, we’ll explore the topic of IoT security in more depth.
When I think about security, the first thing that enters my mind is encryption.
While this is certainly important to keep information confidential, considerably more than cryptography is required to secure the IoT. Why? First, there is more to security than just confidentiality as a review of information security fundamentals will remind us. Second, a distinct set of security requirements applies to each layer of the IoT stack. In this post, we’ll explore how the security model for the actual IoT devices is different from the security model for the communications between devices, which is different from the security model for the IoT service which manages all the devices and aggregates their data.
Read the entire article here, What’s Required To Secure The IoT?