12. Embedded Devices

We might not realize it, but we’re surrounded by embedded computer systems. In this chapter, we take a look at what they are, where they are, why they can be a threat, and what we can do to mitigate the threat.

This brings an important point to mind that we should clarify at the beginning. Embedded systems permeate our lives, but not all of them are a threat. I doubt that you would consider your microwave oven a threat, but most modern microwaves have a microprocessor controlling them. It’s only when we start connecting them to the network that we’re going to start getting worried.


First, we’re going to discuss what an embedded system is, where they’re located, and why you should be worried. We’ll then go through the ...

Get Endpoint Security now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.