From the course: IoT Product Security

Unlock this course with a free trial

Join today to access over 23,100 courses taught by industry experts.

Foundations of trust: Part 2

Foundations of trust: Part 2

From the course: IoT Product Security

Foundations of trust: Part 2

Hi, I'm Matthew Clark. And this is Lesson 4.2: Foundations of Trust, Part 2. In this lesson, we'll look at root of trust further and we'll discuss the associated security services and trust elements. We will review the principle of immutability, and we'll discuss the security concerns and lifecycle planning for root of trust. So let's get started. Let's start with the quiz. When we use this term as it relates to IoT, we are stating that we have confidence in the identity and secure operation of a device. What is the term? Encryption, ice cream, trust, or hardware? The answer is trust. In terms of a hardware root of trust, we're saying that we have confidence in the identity and secure operation of a device. Encryption can provide a trust anchor, a term that we'll discuss later. And certainly, encryption is a vital component of using a root of trust. Hardware is also important to establishing roots of trust, because hardware provides the strongest foundation for trust. And ice cream…

Contents