zip

Security Analysis of Embedded Systems

  • 2013-09-22
  • 421.42KB
  • Points it Requires : 2

Today’s embedded systems often handle sensitive information such as application code (IP) and data, so security is a major concern in their design. In order to establish a reasonable basis for judging whether a proposed security system is adequate or overkill, it is necessary to identify perceived security threats. This means we need to understand who the adversaries are, what capabilities they have, and what their goals are? What are we trying to protect, and who or what are we trying to protect against? There is no one-size-fits-all solution, and no security system is 100% secure. However, a security system does not have to be a perfect solution, nor does it need to be so impenetrable that it loses its value. A security system only needs to be secure enough to withstand possible adversary attacks for the expected useful life of the data it protects.

unfold

You Might Like

Uploader
nishisb
 

Recommended ContentMore

Popular Components

Just Take a LookMore

EEWorld
subscription
account

EEWorld
service
account

Automotive
development
circle

About Us Customer Service Contact Information Datasheet Sitemap LatestNews


Room 1530, 15th Floor, Building B, No.18 Zhongguancun Street, Haidian District, Beijing, Postal Code: 100190 China Telephone: 008610 8235 0740

Copyright © 2005-2024 EEWORLD.com.cn, Inc. All rights reserved 京ICP证060456号 京ICP备10001474号-1 电信业务审批[2006]字第258号函 京公网安备 11010802033920号
×