Conferences and supporting programme
CIA Triad: Three pillars for Securing the Internet of Things
Learn how to protect IoT devices from unauthorized access, use, disclosure, disruption, modification, or even destruction.
Although it has been with us in some form and under different names for many years, the Internet of Things (IoT) is now suddenly the thing. The ability to connect, communicate with, and remotely manage an incalculable number of networked, automated devices via the Internet is becoming pervasive, from the factory floor to the hospital operating room to the residential basement.
The transition from closed networks to enterprise IT networks to the public Internet is accelerating at an alarming pace—and justly raising alarms about security. As we become increasingly reliant on intelligent, interconnected devices in every aspect of our lives, how do we protect potentially billions of them from intrusions and interference that could compromise personal privacy or threaten public safety?
This discussion will highlight which means there are to protect IoT devices from unauthorized access, use, disclosure, disruption, modification, or even destruction. The base foundation for this kind of security is the CIA triad, composed of the following three pillars: confidentiality, integrity and availability. Confidentiality for preserving authorized restrictions on access and disclosure; integrity for guarding against improper information modification or destruction and ensuring information nonrepudiation and authenticity; and availability for ensuring timely and reliable access to the device and information.
This presentation will give an overview of these technologies, and cover implementation methods for all three.
--- Date: 28.02.2018 Time: 2:30 PM - 3:00 PM Location: Exhibitor's Forum, hall 4, stand 4-428