Tuesday, July 30, 2019

Word of the Day: embedded system security

Word of the Day WhatIs.com
Daily updates on the latest technology terms | July 30, 2019
embedded system security

Embedded system security is a strategic approach to protecting software running on embedded systems from attack. An embedded system is a programmable hardware component with a minimal operating system and software.

Embedded systems are designed to perform a dedicated function or functions. Found in consumer electronics, process control systems, aircraft, in-car systems and many other applications, embedded systems need to be extremely reliable. Because of their small size and limited compute resources, however, they can present security challenges for designers and developers.

 

The firmware in embedded systems can be difficult (or impossible) to update, so in the past, such systems were often designed to have a life cycle of 15 years or more. With the growth of the internet of things (IoT), however, the nature of embedded systems is changing and the number of possible attack vectors is growing exponentially. Today, an embedded system in a smart device can be hacked to take control of everything from smart thermostats to industrial control systems.

 

Like security in most IT fields, embedded system security requires an end-to-end approach that includes addressing security issues during the design phase. Security considerations should include the cost of an attack on an embedded system, the cost of an attack and the number of possible attack vectors.

 

To prevent attacks on embedded systems, software developers should:

  • Expect firmware to be updated regularly.
  • Limit access to embedded systems to a need-to-use basis.
  • Provide a way for network administrators to monitor connections to and from embedded systems.
  • Allow integration with third-party security management systems.

Quote of the Day

 
"Every minute you plan in advance for the resiliency of your embedded systems, you'll see payoffs of often five- or tenfold. Take your time and do it properly." - Kevin Beaver

Learning Center

 

Browser OS could turn the browser into the new desktop
In this Q&A, VDC Research's Eric Klein talks about how a browser OS can address security needs and provide a modern UX while automating some of the mundane tasks IT admins have to juggle.

Embedded application security: Inside OWASP's best practices
The new OWASP Embedded Application Security project aims to enhance security for connected devices. Learn some of the best practices and pitfalls to avoid.

Embedded systems security a growing concern amid rise of IoT
The Internet of Things is expanding the definition of what is an embedded system device, but security isn't keeping up with the evolution.

10 types of security incidents and how to handle them
Security incidents are on the rise, coming from a multitude of directions and in many guises. This in-depth look at the nature of the threat and the best ways to respond to it now is essential reading for any security professional.

Why security is the key to emerging technology - and vice versa
Securing emerging tech, such as IoT, drones and smart city deployments, is critical yet not always easy. Tata Communications' Srinivasan CR explains how adding new security tech, including blockchain and AI, can help.

Quiz Yourself

 
Each of the appliances in the model kitchen _________________________.
a. have embedded systems
b. has an embedded system

Answer

Stay in Touch

 
For feedback about any of our definitions or to suggest a new definition, please contact me at: mrouse@techtarget.com

Visit the Word of the Day Archives and catch up on what you've missed!

FOLLOW US

TwitterRSS
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Whatis.com, click here. Please note, this will not affect any other subscriptions you have signed up for.
TechTarget

TechTarget, Whatis, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved.

No comments: