White Papers

Cybersecurity and Secure Deployments

Issue link: https://resources.windriver.com/i/961752

Contents of this Issue

Navigation

Page 1 of 5

TABLE OF CONTENTS Executive Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 The Growing Threat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Cyberdefense: Deconstructing Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Investigating Attacks and Developing Defenses in a Virtual Environment . . . . . . . . . . . . . 3 Undetectable Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Studying Attacks: Checkpoints and Reverse Execution . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Fault Injection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Full Inspection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Observing Future Behavior with Hypersimulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 No Source Code Required . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Secure Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Solving the Challenge of Scale . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Instant Replication of Test Assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Automating the Impossible . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 CYBERSECURITY AND SECURE DEPLOYMENTS 2 | White Paper EXECUTIVE SUMMARY Cybersecurity and secure software deployment are issues that cut across multiple sectors— aerospace, defense, energy, critical infrastructure, industrial automation, medical devices, telecommunications, and more. What these disparate sectors have in common is that a malicious, network-borne intrusion can cause untold damage, whether financial or physical, and even threaten human safety. Fortunately, there are security-strengthening techniques and solutions for cybersecurity research that can apply in all of these areas. This paper explains why creating and testing security solutions is more effectively performed using virtual hardware and system simulation technology, rather than using the live systems that are being subjected to attacks.

Articles in this issue

view archives of White Papers - Cybersecurity and Secure Deployments