From the course: Understanding Edge Computing in a Cloud Computing World
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Edge computing: Security
From the course: Understanding Edge Computing in a Cloud Computing World
Edge computing: Security
- [Presenter] So let's dig deeper into edge security and answer the question, how do we secure edge-base computing? Well, first and foremost we need to encrypt everything in flight and at rest. And we do this for the reason because if people can see the data either moving over the network or stored in the particular system such as a device being stolen within a factory floor or something like that even though they own or have the data on the physical disk they're unable to read it and so therefore you want to encrypt everything either in flight, moving through the network or at rest sitting on a physical disc. Need to use secure tunnels in VPN, Virtual Private Networks when we can. So therefore we're not necessarily transmitting everything over the open internet but we're leveraging secure communication channels if needed. And we need to continuously improve security. So moving forward, it's always asking the question…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.