Description
- How can insecure systems be attacked?
- What common actions should be taken to help to secure systems?
- What options do I have to secure HTTP traffic?
- What options do I have to secure MQTT traffic?
- What options do I have with other protocols?
- What is a PEP Proxy and how can I use one to protect services and device?s
Live coding session and commentary, demonstrating various techniques and methods for securing the interactions between Devices, IoT Agents, and the Context Broker.