An IoT infrastructure needs to be secured, in order for people to trust it, and to prevent attackers from compromising the security and privacy goals of the applications deployed in the infrastructure. This deliverable extends the requirements defined in IT-1, by taking into account the experience from the previous iteration, the planned work for IT-2, and recent industry and academic research.
It describes secure-by-design software development.
Attachment | Size |
---|---|
mF2C D2.5 Security-Privacy Requirements and Features (IT-2).pdf | 976.76 KB |
Cyberwatching.eu has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 740129. The content of this website does not represent the opinion of the European Commission, and the European Commission is not responsible for any use that might be made of such content. Privacy Policy | Disclaimer / Terms and Conditions of Use