-
Module 1: Introduction 1
-
Module 2: Architectures 1
-
Module 3: Sensor and Interfacing 1
-
Module 4: Protocols and Cloud 1
-
Module 5: Privacy, Security, and Governance 1
-
Module 6: Visualization and Data Types of IIoT 1
-
Module 7: Application of IIOT 1
-
Projects: 2
-
Lecture8.1
-
Lecture8.2
-
This content is protected, please login and enroll course to view this content!
Introduction to Web Security; Conventional Web Technology and Relationship with IIOT; Vulnerabilities of IoT; Privacy; Security Requirements; Threat Analysis; Trust; IoT Security Tomography and Layered Attacker Model; Identity Establishment; Access Control; Message Integrity; Non-Repudiation and Availability; Security Model for IoT; Network Security Techniques; Management Aspects of Cyber Security
Prev
Real life scenario-based applications to overcome day- to-day issuesS
Next