Section 15.144 Embedded Systems Flashcards

Objective 3.1 Compare and contrast security implications of different architecture models. Objectives 4.1 Given a scenario, apply common security techniques to computing resources

1
Q

Embedded Systems

A

Specialised computing components designed for dedicated functions within larger devices

■ They seamlessly integrate hardware and mechanical elements and are essential for various daily-use devices

Examples: Smart phones or cars like engine control which utilises embedded systmes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Real-Time Operating System (RTOS)

A

Designed for real-time applications that process data without significant delays

■ Critical for time-sensitive applications like flight navigation and medical equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Risks and Vulnerabilities in Embedded Systems

Hardware Failure

A

Prone to failure in harsh environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Risks and Vulnerabilities in Embedded Systems

Software Bugs

A

Can cause system malfunctions and safety risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Risks and Vulnerabilities in Embedded Systems

Security Vulnerabilities

A

Vulnerable to cyber-attacks and unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Risks and Vulnerabilities in Embedded Systems

Outdated Systems

A

Aging software and hardware can be more susceptible to attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Key Security Strategies for Embedded Systems

Network Segmentation

A

Divide the network into segments to limit potential damage in case of a breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Key Security Strategies for Embedded Systems

Wrappers (e.g., IPSec)

A

Protect data during transfer by hiding data interception points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Key Security Strategies for Embedded Systems

Firmware Code Control

A

Manage low-level software to maintain system integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Key Security Strategies for Embedded Systems

Challenges in Patching

A

Updates face operational constraints; OTA updates demand meticulous planning and security measures

○ Over-the-Air (OTA) Updates
■ Patches are delivered and installed remotely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly