Supplier eBooks

NXP - 7 Experts Discuss Managing Security Risk and Regulatory Compliance at the Edge

Issue link: https://resources.mouser.com/i/1530851

Contents of this Issue

Navigation

Page 15 of 22

C h a p t e r 3 Security in edge computing isn't about implementing every possible safeguard—it's about applying the right level of security in the right places. This concept, often referred to as the proportionality of risk, aims for resources to be effectively allocated to protect devices and systems on the basis of the potential threats they face. Over-securing low-risk devices can result in unnecessary costs and inefficiencies, while under-securing high- risk devices can lead to significant vulnerabilities. To strike the right balance, organizations must perform PROPORTIONALITY OF RISK – INTRODUCTION TO RISK/ THREAT ANALYSIS A security problem can have multiple solutions. Here is where it's important to understand the overall system and measure the impact of the risk. At the end of the day, you need to look back at what makes sense and what is efficient for your unique application." Carlos Serratos IoT Certification Expert, NXP Semiconductors 16 7 Experts Discuss Managing Security Risk and Regulatory Compliance at the Edge

Articles in this issue

Links on this page

view archives of Supplier eBooks - NXP - 7 Experts Discuss Managing Security Risk and Regulatory Compliance at the Edge