8
Security at the Edge
Security must not be overlooked or considered an appendage to a system—and this applies to any system. We live in a world where there is a greater propensity for a device or system to be compromised maliciously than fail on its own. Security, as they say, is only as good as the weakest link in a chain. With Edge systems, the chain just got longer and is far more distant and remote. The Edge is the most attractive medium for recent systemic attacks on infrastructure. The reason the Edge is so powerful is that the number of Edge computers and IoT devices has grown exponentially, whereas the number of data center servers and personal computers has not. Edge systems are considered a weak point, and much of the lessons learned ...
Get Edge Computing Simplified now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.