Information Security Implementations for Embedded Systems – Aviation Today

Advertisement

BEGIN ARTICLE PREVIEW:

Different embedded devices, systems, and industries have varying security requirements and often require a custom lens. This paper examines the implementations of the well-known information security components of confidentiality, integrity, and availability (the CIA triad2) as applied toembedded systems, and how these implementations can be used to defend against various attacks.
This White Paper Covers:

Security implementations of the CIA triad as applied to embedded systems
How these implementations can be used to defend against various attacks against embedded systems
How a defense-in-depth approach is used to secure an embedded system

Read White Paper  →



END ARTICLE PREVIEW

READ MORE FROM SOURCE ARTICLE