From the course: IoT Product Security
Unlock this course with a free trial
Join today to access over 23,100 courses taught by industry experts.
Vulnerability management and patching: Part 2
From the course: IoT Product Security
Vulnerability management and patching: Part 2
Hi, I'm Matthew Clark. And this is Lesson 6.3: Vulnerability Management and Patching, Part 2. In this lesson, we'll discover different update types. We'll discuss over-the-air updates and identify three methods of it. And then we'll conclude by talking why I can't drive 55. There are many different types of updates, including automatic over-the-air updates in which no user intervention is required. These are generally cryptographically signed so that you can only load the images from the OEM. Maybe the device will reboot or maybe it won't. You may or may not know about it. The next type is over-the-air. They're manually initiated cryptographically signed updates. Different types of devices do this. It requires a device user to stop what they're doing and to kick that off. Some of the security cameras that I use around the home provide that. They tell me that there's an update and wait for me to initiate it. Of course, there's the over-the-air manually initiated unsigned updates…
Contents
-
-
-
-
-
-
-
Manufacturing and provisioning9m 30s
-
(Locked)
Vulnerability management and patching: Part 19m 41s
-
(Locked)
Vulnerability management and patching: Part 211m 51s
-
(Locked)
Vulnerability Disclosure Program: Part 17m 26s
-
(Locked)
Vulnerability Disclosure Program: Part 27m 49s
-
(Locked)
Vulnerability Disclosure Program: Part 38m 26s
-
(Locked)
Device ownership8m 3s
-
(Locked)
IOTSF Secure Design Best Practice Guides7m 4s
-
-