Industrial IoT Security: Best Practice for Authentication - Henrike Gerbothe - IoT & Edge Days 2022

Subscribers:
24,000
Published on ● Video Link: https://www.youtube.com/watch?v=G6BhLZsPztk



Duration: 43:32
295 views
6


Henrike Gerbothe and Jürgen Fitschen speak at IoT & Edge Days 2022

Get Social!
Follow us on Twitter:https://twitter.com/EclipseIoT
Follow us on LinkedIn: https://www.linkedin.com/showcase/eclipse-iot
Like us on Facebook: https://www.facebook.com/eclipseiot/
Tag us: #EclipseFdn​​​​ #EclipseIoT​​​​

Website: https://iot.eclipse.org/


Locally or globally networked industrial automation applications can be functionally assigned to the Internet of Things (IoT). On the one hand, they are now also exposed to the same risks of possible cyberattacks as millions of other IoT applications. On the other hand, with regard to the cyber security protection of such applications, they can also refer to standards and norms such as ETSI EN 303 645, NITSIR 8259, and IEC 62443. In the past, many IoT devices were provided with universal usernames and passwords (such as "admin,"admin") by the manufacturers to make initial commissioning easier. The lecture provides some standard-compliant examples with safe but still user-friendly methods that should be used instead. One of them is based on QR codes and a special out-of-band channel technique. One other uses FIDO2 compatible hardware tokens.




Other Videos By Eclipse Foundation


2022-06-29Cloud Clips Episode 4 - Tracing Trace Compass! The Secret Trace Compass Developers WANT You To Know
2022-06-29Eclipse Cloud DevTools Community Call - June 29 2022
2022-06-23Cloud Clips Episode 3 - Opening a Trace in Trace Compass
2022-06-20Eclipse IDE WG Community Call June 14, 2022
2022-06-15Cloud Clips Episode 2 - Instrumenting Code Using Trace Compass Helpers
2022-06-13AICE Working Group Monthly Meeting | June 10 2022
2022-06-08Eclipse iceoryx Blueberry - Speeds up AUTOSAR Adaptive
2022-06-08(Foss-North) What should I know about secure boot and TEEs? - Marta Rybczynska
2022-06-08(Foss-North) Eclipse Oniro compliance toolchain - Carlo Piana, Alberto Pianon, Rahul Mohan G
2022-06-03Edge of Things - Security at the Edge
2022-06-02Industrial IoT Security: Best Practice for Authentication - Henrike Gerbothe - IoT & Edge Days 2022
2022-06-02High Performance Network Programming in Rust - Angelo Corsaro - Virtual IoT & Edge Days 2022
2022-06-02Eclipse IoT: The Next Ten Years - Frédéric Desbiens - Virtual IoT & Edge Days 2022
2022-06-02No-compromise Security at the Edge - Gabriele Montanari - Virtual IoT & Edge Days 2022
2022-06-02Revolutionizing AI at the Edge with the New Release of ioFog 3.0 - Kilton Hopkins - Iot & Edge Days
2022-06-02From "Can't" to "Can" with Kanto - Konstantina Gramatova - Virtual IoT & Edge Days 2022
2022-06-02Driving Digital Transformation: The Open Source Approach - Mike Milinkovich - IoT & Edge Days 2022
2022-06-02Panel Discussion: Decentralized Spatial Communication - Virtual IoT & Edge Days 2022
2022-06-02TSF Monitoring - IoT in the Mining Sector - Prasan Dutt - Virtual IoT & Edge Days 2022
2022-06-02Continuous Deployment of IoT Sensors - Ulf Lilleengen - Virtual IoT & Edge Days 2022
2022-06-02MQTT over QUIC: Opportunities and Challenges - William Yang - Virtual IoT & Edge Days 2022