Supplier eBooks

Cypress - 7 Experts on IoT Security and Privacy

Issue link: https://resources.mouser.com/i/1516458

Contents of this Issue

Navigation

Page 32 of 32

33 1. When planning a secure IoT design, the first consideration must be the device use case. Security comes with a cost. The level of security you apply depends on the device use case. 2. If applications are performing secure operations on the IoT device, they can do so by running secure operations in a trusted execution environment on the IoT device. They can also do so by running the application in a secure element. KAMALJIT SINGH System Architect, IDEMIA KEY POINTS

Articles in this issue

view archives of Supplier eBooks - Cypress - 7 Experts on IoT Security and Privacy