How can insecure systems be attacked? What common actions should be taken to help to secure systems?What options do I have to secure HTTP traffic? What options do I have to secure MQTT traffic? What options do I have with other protocols? What is a PEP Proxy and how can I use one to protect services and device?s Live coding session and commentary, demonstrating various techniques and methods for securing the interactions between Devices, IoT Agents, and the Context Broker.
Live coding session and commentary, demonstrating various techniques and methods for securing the interactions between Devices, IoT Agents, and the Context Broker.