A Survey of Information Security Implementations for Embedded Systems

Different embedded devices, systems, and industries have varying security requirements and often require a custom lens. This paper will provide an introductory-level explanation of the CIA triad implementations based on confidentiality, integrity, and availability, and how each relates to an embedded device and system.


LEARN

  • Security implementations of the CIA triad as applied to embedded systems
  • How these implementations can be used to defend against various attacks against embedded systems
  • How a defense-in-depth approach is used to secure an embedded system
Previous
Protect Critical IoT Devices with VxWorks Secure Boot and Secure Loading
Protect Critical IoT Devices with VxWorks Secure Boot and Secure Loading

Hacker attacks and attempts on national critical infrastructure continue to rise. VxWorks® provides essenti...

Next
The RTOS as the Engine Powering IoT Critical Infrastructure
The RTOS as the Engine Powering IoT Critical Infrastructure

Digital transformation offers industrial manufacturers the vision of business advantages and efficiencies t...