The challenging concept of ensuring security over the new IoT device and technology implementation at the corporation is now the next task which must be briefed and understood by management. Corporate sensitive information, personally identifiable information, financial records and more will be within the IoT sphere therefore a meeting is required to discuss the security infrastructure needed for effective IoT implementation. Management would like a 3-5 page concept paper put together bringing depth to the critical security concepts needed for the IoT asset tracking implementation and strong device identity protection. Identify the core IoT security requirements for the following:
Describe the security infrastructure needed to establish “trust” when a device connects to the network.
Identify the required security needed to ensure personal, sensitive and financial information is kept private and secure, and device identity is preserved.
For the devices and the data being sent across the IoT infrastructure, security integrity is critical. Describe how security professionals will ensure the “data integrity” and encryption of information being transmitted.