Slide 1 Slide 2 Slide 3 Slide 4 Slide 5 Slide 6 Slide 7 Slide 8 Slide 9 Slide 10 Slide 11 Slide 12 Product List
IoT Device Security Five Simple Steps Slide 7

Often overlooked are Protected Ports. This is physical security. Sometimes they are called JTAG ports. Essentially, there are other ways of actually going in and physically debugging the system and since one has to physically have access to the device, most people do not worry about it.

PTM Published on: 2017-10-23