From the course: Understanding Edge Computing in a Cloud Computing World

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Edge computing: Security

Edge computing: Security

From the course: Understanding Edge Computing in a Cloud Computing World

Start my 1-month free trial

Edge computing: Security

- [Presenter] So let's dig deeper into edge security and answer the question, how do we secure edge-base computing? Well, first and foremost we need to encrypt everything in flight and at rest. And we do this for the reason because if people can see the data either moving over the network or stored in the particular system such as a device being stolen within a factory floor or something like that even though they own or have the data on the physical disk they're unable to read it and so therefore you want to encrypt everything either in flight, moving through the network or at rest sitting on a physical disc. Need to use secure tunnels in VPN, Virtual Private Networks when we can. So therefore we're not necessarily transmitting everything over the open internet but we're leveraging secure communication channels if needed. And we need to continuously improve security. So moving forward, it's always asking the question…

Contents