Chapter 1
Introduction to Embedded Systems Security
Chapter Outline
1.2 What is an Embedded System?
1.3.1 Embedded Systems Complexity
1.3.1.1 Case Study: Embedded Linux
1.3.2 Network Connectivity
1.3.3 Reliance on Embedded Systems for Critical Infrastructure
1.3.4 Sophisticated Attackers
1.3.5 Processor Consolidation
1.4.1 Perfect Security
1.4.2 Confidentiality, Integrity, and Availability
1.4.3 Isolation
1.4.4 Information Flow Control
1.5 Security Threats
1.6 Wrap-up
1.7 Key Points
1.1 What is Security?
Any book about ...
Get Embedded Systems Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.