Posted on
in Presentations
The presentation will demonstrate how the National Cybersecurity Center of Excellence’s proof of concept implementations of the Manufacturer Usage Description (MUD) Specification (RFC 8520) can be used in controlling access to IoT devices. Lessons learned and implementation issues will be explored.
Pre-Requisites: Elementary understanding of networking.
Pre-Requisites: Elementary understanding of networking.
Share With Your Community