YoVDO

Practical Use of the MUD Specification to Support Access Control in the IoT

Offered By: RSA Conference via YouTube

Tags

RSA Conference Courses Cybersecurity Courses Access Control Courses

Course Description

Overview

Explore the practical applications of the Manufacturer Usage Description (MUD) Specification in controlling access to IoT devices in this 28-minute conference talk from the RSA Conference. Join Dr. Parisa Grayeli, Manager of the NCCoE MUD Laboratory at Mitre/NCCoE, and Blaine Mulugeta, Cyber Security Engineer at Mitre/NCCoE, as they demonstrate proof of concept implementations from the National Cybersecurity Center of Excellence. Gain insights into lessons learned and implementation issues surrounding RFC 8520. Discover how MUD can enhance IoT security and access control, with an elementary understanding of networking recommended for attendees.

Syllabus

Practical Use of the MUD Specification to Support Access Control in the IoT


Taught by

RSA Conference

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network