A Survey of Information Security Implementations for Embedded Systems
Different embedded devices, systems, and industries have varying security requirements and often require a custom lens. This paper examines the implementations of the well-known information security components of confidentiality, integrity, and availability (the CIA triad2) as applied to
embedded systems, and how these implementations can be used to defend against various attacks.
This White Paper Covers:
- Security implementations of the CIA triad as applied to embedded systems
- How these implementations can be used to defend against various attacks against embedded systems
- How a defense-in-depth approach is used to secure an embedded system
Read White Paper →