Supplier eBooks

Cypress - 7 Experts on IoT Security and Privacy

Issue link: https://resources.mouser.com/i/1516458

Contents of this Issue

Navigation

Page 12 of 32

another continent, and the teams don't always have all the information to guarantee the best security." Fumagalli suggests the need for several strategies to secure IoT devices: Use a certificate to authenticate devices, and use safe connections for device communications. Work with cloud engineers to use a good data-encryption strategy. In addition to strong data encryption, limit data communications to the minimum needed for proper operations so that unwanted access will be more difficult. Design the device to simulate a different kind of hardware so that from the outside, the device will be unrecognizable. Consider component selection and purpose-built design because devices limited in their capabilities to a narrow purpose are more difficult to attack. Additional security measures include providing user information that shows how to create more secure device connections. "By providing users with rules for an external firewall configuration, you give them a way to make a more secure installation," says Fumagalli. "Unfortunately, for consumer products, few users have the required knowledge for such settings." He also recommends having a way to update the software on the device remotely. "Always keep the systems current with the latest update. Using the currently available version of the software is important, which means staying in touch with chip and operating system builders," he says. " Some legal regulations can limit the security, such as the limit on encrypting data. . . . In these cases, it is always better not to settle for a lower level of security." 13

Articles in this issue

view archives of Supplier eBooks - Cypress - 7 Experts on IoT Security and Privacy