May 2020
Intermediate to advanced
262 pages
6h 48m
English
Often, edge analytics applications are set up in remote locations. Security for applications like this may come down to physically securing hardware in cases that are locked with a key. One option may be to use a key switch attached to a general-purpose input/output (GPIO) port, where in order to add or change the code on the edge device, a physical key is required to set a flag. An example key switch is shown in the following photo:

Other options may be to have the edge device shut down if a certain number of unsuccessful login attempts are made.