Search icon CANCEL
Subscription
0
Cart icon
Close icon
You have no products in your basket yet
Save more on your purchases!
Savings automatically calculated. No voucher code required
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Arduino Data Communications

You're reading from  Arduino Data Communications

Product type Book
Published in Nov 2023
Publisher Packt
ISBN-13 9781837632619
Pages 286 pages
Edition 1st Edition
Languages
Author (1):
Robert Thas John Robert Thas John
Profile icon Robert Thas John

Table of Contents (20) Chapters

Preface 1. Part 1:Introduction to Arduino and Sensor Data
2. Chapter 1: Getting Started with Arduino 3. Chapter 2: Leveraging Various Sensors for Data Acquisition 4. Chapter 3: Prototyping with Shields 5. Chapter 4: Storing Data Collected from Sensors 6. Chapter 5: Implementing REST and MQTT Protocols for Communication 7. Part 2:Sending Data
8. Chapter 6: Utilizing Various Communication Technologies 9. Chapter 7: Communicating with LoRaWAN 10. Chapter 8: Working with Ethernet 11. Chapter 9: Leveraging Cellular Communication Technology 12. Chapter 10: Communicating via HC-12 13. Chapter 11: Managing Communication with RS-485 14. Part 3: Miscellaneous Topics
15. Chapter 12: Enhancing Security for Reducing Risk 16. Chapter 13: Scaling for High Availability 17. Chapter 14: Building and Manufacturing Hardware 18. Index 19. Other Books You May Enjoy

Embracing cloud security

There are various providers of cloud computing both at the platform level and at the infrastructure level. All providers have security features native to them that might appear to be overwhelming at first. You only need to do a bit of studying to get up to speed.

Multi-factor authentication

We already discussed MFA in the previous section, but repeating it here will only reinforce its importance. Every cloud provider worth using will have MFA baked in. Ensure that all of your users utilize MFA.

Identity and access management

Identity and Access Management (IAM) is how you control access to what a user can do on your cloud platform. On a cloud platform, users aren’t limited to humans. They could also be services. When it comes to controlling or granting permissions, apply the principle of least privilege. This simply means that you grant privileges or permissions that let the user do only what they need to do. For example, on GCP, you can...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}