Section 15.144 Embedded Systems Flashcards
Objective 3.1 Compare and contrast security implications of different architecture models. Objectives 4.1 Given a scenario, apply common security techniques to computing resources
Embedded Systems
Specialised computing components designed for dedicated functions within larger devices
■ They seamlessly integrate hardware and mechanical elements and are essential for various daily-use devices
Examples: Smart phones or cars like engine control which utilises embedded systmes
Real-Time Operating System (RTOS)
Designed for real-time applications that process data without significant delays
■ Critical for time-sensitive applications like flight navigation and medical equipment
Risks and Vulnerabilities in Embedded Systems
Hardware Failure
Prone to failure in harsh environments
Risks and Vulnerabilities in Embedded Systems
Software Bugs
Can cause system malfunctions and safety risks
Risks and Vulnerabilities in Embedded Systems
Security Vulnerabilities
Vulnerable to cyber-attacks and unauthorised access
Risks and Vulnerabilities in Embedded Systems
Outdated Systems
Aging software and hardware can be more susceptible to attacks
Key Security Strategies for Embedded Systems
Network Segmentation
Divide the network into segments to limit potential damage in case of a breach
Key Security Strategies for Embedded Systems
Wrappers (e.g., IPSec)
Protect data during transfer by hiding data interception points
Key Security Strategies for Embedded Systems
Firmware Code Control
Manage low-level software to maintain system integrity
Key Security Strategies for Embedded Systems
Challenges in Patching
Updates face operational constraints; OTA updates demand meticulous planning and security measures
○ Over-the-Air (OTA) Updates
■ Patches are delivered and installed remotely