When deploying an application to the internet, the risks posed by cyber criminals should be taken very seriously. Internet-enabled devices, including edge computers, are prone to cyber attacks, where they may be used to shut down websites or cause havoc on the internet—not to mention the destruction that cyber attacks can cause to our networked applications.
In this chapter, we will cover security—and, in turn, privacy—when it comes to our edge analytics applications.
The following topics will be covered in this chapter:
- An overview of the Internet-of-Things security
- Types of attacks against our edge analytics applications
- Protecting our edge analytics applications
- Monitoring and auditing our edge analytics applications