From the course: IoT Product Security
Unlock this course with a free trial
Join today to access over 23,100 courses taught by industry experts.
Module 14 review
Hi, I'm Matthew Clark. And this Lesson 4.14: Module 4 Review. We've gone through a lot of technical details in the last several lessons, so I think a review is important. In this lesson, we will review foundations of trust, the trusted execution environment, the trusted platform module, the hardware security module, and the device identity, and device attestation. So let's get started. In our foundations of trust section, we reviewed Microsoft seven properties of highly secure devices, which included starting with a hardware root of trust, having a small trusted computing base, using defense in depth and compartmentalization, using certificate-based authentication and planning for renewable security and using failure reporting. We also learned that it's vital to maintain trust throughout the device lifecycle, and that identification is a requirement for authentication. And enablers of trust included cryptography, secure storage, keeping trusted from untrusted, and using immutable…
Contents
-
-
-
-
-
Foundations of trust: Part 110m 23s
-
(Locked)
Foundations of trust: Part 29m 6s
-
(Locked)
Foundations of trust: Part 39m 5s
-
(Locked)
Foundations of trust: Part 411m 29s
-
(Locked)
Encryption8m 39s
-
(Locked)
Trusted execution environment7m 57s
-
(Locked)
Trusted Platform Module: Part 17m 49s
-
(Locked)
Trusted Platform Module: Part 27m 53s
-
(Locked)
Trusted Platform Module: Part 39m 46s
-
(Locked)
Trusted Platform Module: Part 412m 50s
-
(Locked)
Hardware security9m 57s
-
(Locked)
DICE: Part 17m 45s
-
(Locked)
DICE: Part 29m 40s
-
(Locked)
Module 14 review10m 7s
-
-
-
-