Ready to download this white paper?

First Name
Last Name
Job Title
Phone Number
You may receive a request for your feedback from OpenSystems Media. Read our new Privacy Policy to understand what data we collect, why we collect it, and what we do with it.
Europe OptIn
Your download is ready!
Error - something went wrong!

Security Awareness

October 28, 2019

The most secure system in the world is powered off, embedded in concrete, and mined with tamper-sensitive explosives. Unfortunately, it is also the most useless system in the world. In order for a system to be useful, it needs to interact with the environment and provide some level of functionality. Historically, embedded systems were mostly islands – that is, they provided their functionality in a stand-alone manner, and weren’t connected, or had limited connectivity to other systems. With these kinds of systems, it was relatively easy to analyze their security – the number of ways of getting in and compromising the operation was extremely limited. Systems today are more connected. A lot of these protocols and connections are incorporated into modern devices as a matter of course, without enough thought given to their security implications. 

Previous White Paper
IoT Security Top 20 Design Principles
IoT Security Top 20 Design Principles

IoT Security Top 20 Design Principles

Next Article
IAR Systems Updates its Security Development Tool C-Trust

IAR Systems launched a new version of its security development tool C-Trust.