SlideShare a Scribd company logo
1 of 21
Download to read offline
5 Thingsto Know about
	 Safety and Security of
Embedded Systems
Done by MEN
A secure system is one where the features are
relatively inaccessible to unauthorized users,
therefore the system is protected.
A safe system needs to be secure, whereas,
a secure system may not need to be safe
depending on the application.
Safety and Security of Embedded Systems
1. 	What are the main characteristics of a safe embedded system?
2. 	What are the main characteristics of a secure embedded system?
3. 	What are the major provisions to make an embedded system safe?
4. 	What are the major provisions to make an embedded system secure?
5. 	What are the security measures for a safe embedded system?
Safety and Security of Embedded Systems
1.
What are the main characteristics
of a safe embedded system?
1. What are the main characteristics of a safe embedded system?
Safety-critical applications require safe embedded system architectures
with a predictable failure behavior to prevent from loss of life, substantial
financial damage or severe harm to the environment.
As a safe system is not likely to cause such heavy damages, there must be
measures defined that intervene in case of any malfunction.
The complex architecture of such systems usually requires equally complex
hardware, software, development rules, followed by a strict certification
process.
2.
What are the main characteristics
of a secure embedded system?
The security of embedded systems deals with the protection of the
data they store, access to and communicate with the world – reducing
vulnerabilities of hardware and software.
High assurance embedded computing is necessary for the security,
integrity, confidentiality and high availability of the application, especially
with the increasing importance of the IoT and trends like BYOD.
Building protection into the device itself provides security before the
corporate firewall. Security needs to be considered early in the design of a
new system and may even be customized according to the requirements
of the application.
2. What are the main characteristics of a secure embedded system?
3.
What are the major provisions
to make an embedded system safe?
» Fail-Safe Behavior. In case of a serious failure, the system enters a defined
safe state. If it is fail-silent, it shuts down completely.
» Redundancy. Multiplying critical components, such as the CPU, increases
the function‘s reliability.
» Clustering. This does not increase a subsystem‘s safety, but it raises
availability. Backing up a system is using redundancy on a higher level with
the aim of keeping your system up even in case of a failure.
3. What are the major provisions to make an embedded system safe?
» Radiation Resistance. Cosmic radiation can cause memory errors in
airborne applications. Special design can prevent effects like Single Event
Upsets (SEU) in FPGA and memory components.
» Supervisors. Board management and supervision in safe computers
need to go beyond the usual CPU functions. A reliable CPU should have a
dedicated monitor at its side rather than supervise itself.
» Diversity. If redundant components are identical, a common cause can
make them fail. This is why a system must support dissimilarities both in
hardware and in software, e.g., diversely built up I/O or different operating
systems on redundant processors.
3. What are the major provisions to make an embedded system safe?
» Determinism. The need for predictable behavior forbids a number of
mechanisms, like interrupts, common in non-critical applications. Design
engineers need particular expertise in this respect.
» Event Logging. While this is not a necessary safety function, it can help
track back faults in critical systems in case of an incident. Chances are
higher to avoid the error cause in the future by taking precautions.
3. What are the major provisions to make an embedded system safe?
4.
What are the major provisions
to make an embedded system secure?
» Threat prevention, detection, and response. User account access controls
and cryptography can protect systems files and data. Firewalls prevent
systems from a network security perspective. Intrusion detection systems
are designed to detect network attacks in progress. Response is the
summary of methods to effectively protect the system from harm.
4. What are the major provisions to make an embedded system secure?
» Software-based and hardware-based security. Hardware-based or assisted
computer security offers an alternative to software-only computer
security:
» TPM. Trusted platform modules secure devices by integrating crypto-
graphic capabilities on processors and SOCs. Used together with ser-
ver-side software, TPMs detect and authenticate hardware devices,
preventing unauthorized access.
		» Secure boot. Based on hardware support, this method uses
cryptographically signed code to verify authentication.
4. What are the major provisions to make an embedded system secure?
» Intrusion detection/prevention. As a hardware or software
implemented function, IDS triggers an alarm, whereas IPS is capable of
interrupting the connection, modifying or destroying data packages.
		» Drive locks. Drive locks are software tools to encrypt internal and
external hard drives, making them inaccessible to unauthorized
parties.
		» USB dongle. It creates a secure encrypted tunnel between the
software application and the key, or can be used to access web-based
content, or can be configured to lock or unlock a computer.
4. What are the major provisions to make an embedded system secure?
» Disabling USB ports. This is another security option to prevent from
hostile access.
		» Device tampering. This detection method shows when the seal on the
device enclosure has been broken, indicating that a not authorizated
person may be violating the system.
		» Firewall. A firewall is – in addition to the more specific hardware
protection – a software layer to defend against common attacks.
		» Security patches and updates. Being part of the vulnerability
management, security patches are the primary method of fixing
security weaknesses in software.
4. What are the major provisions to make an embedded system secure?
5.
What are the security measures
for a safe embedded system?
Safe embedded systems control critical functions in industrial automation,
transportation, and other markets, where a collapse of the system caused
by an external attack could have catastrophic consequences. And – critical
embedded systems are often deployed in the field or even mobile, being
may be directly connected to the Internet with none of the protections
found in a corporate environment.
5. What are the security measures for a safe embedded system?
» Up to now the preferred method is still to keep a safe system away from
standard networks, the Internet or the Cloud.
» To exchange operation data between a safe computer and open
networks, “vital-to-non-vital” gateways may be one way to achieve the
security needed.
With no extra security measures for safe embedded systems yet on
the horizon, it is said that at least physical computer attacks and social
engineering can only be prevented by non-computer means, e.g. with
trainings of the personnel.
5. What are the security measures for a safe embedded system?
www.men.de/competencies/safe-computing/
www.men-france.fr/competencies/safe-computing/
www.menmicro.com/competencies/safe-computing/

More Related Content

What's hot

Security case buffer overflow
Security case buffer overflowSecurity case buffer overflow
Security case buffer overflowIan Sommerville
 
Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklistbackdoor
 
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...Tonex
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentGary Bahadur
 
Security Vulnerabilities in Modern Operating Systems
Security Vulnerabilities in Modern Operating SystemsSecurity Vulnerabilities in Modern Operating Systems
Security Vulnerabilities in Modern Operating SystemsCisco Canada
 
Operating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportOperating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportAjit Gaddam
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded SystemsAngela Hauber
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint ProtectionMindRiver Group
 
Role of Information Security Manager
Role of Information Security ManagerRole of Information Security Manager
Role of Information Security ManagerCentextech
 
physical security abdullah hassan al alyani
physical security abdullah hassan al alyaniphysical security abdullah hassan al alyani
physical security abdullah hassan al alyaniAeliani92
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentFaheem Ul Hasan
 
Managing i.t security
Managing i.t securityManaging i.t security
Managing i.t securityOriginalGSM
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxArrow ECS UK
 
CS 5032 L12 security testing and dependability cases 2013
CS 5032 L12  security testing and dependability cases 2013CS 5032 L12  security testing and dependability cases 2013
CS 5032 L12 security testing and dependability cases 2013Ian Sommerville
 
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSymantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSree Harsha Boyapati
 
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and ExploitsMeltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and ExploitsAlienVault
 
Information Systems Security Review (ISR) 2003
Information Systems Security Review (ISR) 2003Information Systems Security Review (ISR) 2003
Information Systems Security Review (ISR) 2003Donald E. Hester
 

What's hot (20)

SIEM in NIST Cyber Security Framework
SIEM in NIST Cyber Security FrameworkSIEM in NIST Cyber Security Framework
SIEM in NIST Cyber Security Framework
 
Security case buffer overflow
Security case buffer overflowSecurity case buffer overflow
Security case buffer overflow
 
Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklist
 
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...
Cybersecurity Applied to Embedded Systems, Fundamentals of Embedded Systems a...
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Security Vulnerabilities in Modern Operating Systems
Security Vulnerabilities in Modern Operating SystemsSecurity Vulnerabilities in Modern Operating Systems
Security Vulnerabilities in Modern Operating Systems
 
Operating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability reportOperating systems security 2007 vulnerability report
Operating systems security 2007 vulnerability report
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint Protection
 
Role of Information Security Manager
Role of Information Security ManagerRole of Information Security Manager
Role of Information Security Manager
 
physical security abdullah hassan al alyani
physical security abdullah hassan al alyaniphysical security abdullah hassan al alyani
physical security abdullah hassan al alyani
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Managing i.t security
Managing i.t securityManaging i.t security
Managing i.t security
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
CS 5032 L12 security testing and dependability cases 2013
CS 5032 L12  security testing and dependability cases 2013CS 5032 L12  security testing and dependability cases 2013
CS 5032 L12 security testing and dependability cases 2013
 
System dependability
System dependabilitySystem dependability
System dependability
 
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSymantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
 
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and ExploitsMeltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
 
Information Systems Security Review (ISR) 2003
Information Systems Security Review (ISR) 2003Information Systems Security Review (ISR) 2003
Information Systems Security Review (ISR) 2003
 
Infrastructure resilience
Infrastructure resilienceInfrastructure resilience
Infrastructure resilience
 

Similar to 5 Things to Know about Safety and Security of Embedded Systems

Understanding security operation.pptx
Understanding security operation.pptxUnderstanding security operation.pptx
Understanding security operation.pptxPiyush Jain
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowNuuko, Inc.
 
Part 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docxPart 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docxdanhaley45372
 
A Secure Software Engineering Perspective
A Secure Software Engineering PerspectiveA Secure Software Engineering Perspective
A Secure Software Engineering Perspectiveidescitation
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkClearnetwork
 
Designing a security policy to protect your automation solution
Designing a security policy to protect your automation solutionDesigning a security policy to protect your automation solution
Designing a security policy to protect your automation solutionSchneider Electric India
 
Information Technology Question.pdf
Information Technology Question.pdfInformation Technology Question.pdf
Information Technology Question.pdfbkbk37
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security EngineeringMuhammad Asim
 
System Security Sem 2(Module 1).pptx
System Security Sem 2(Module     1).pptxSystem Security Sem 2(Module     1).pptx
System Security Sem 2(Module 1).pptxrahulkumarcscsf21
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4Rodrigo Piovesana
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksEmmanuel Oshogwe Akpeokhai
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operationsPiyush Jain
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfanandanand521251
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineeringaizazhussain234
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence SystemJoseph Yosi Margalit
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET Journal
 
OSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint SecurityOSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint SecurityIvanti
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentationAlan Holyoke
 

Similar to 5 Things to Know about Safety and Security of Embedded Systems (20)

Understanding security operation.pptx
Understanding security operation.pptxUnderstanding security operation.pptx
Understanding security operation.pptx
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should Know
 
Part 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docxPart 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docx
 
A Secure Software Engineering Perspective
A Secure Software Engineering PerspectiveA Secure Software Engineering Perspective
A Secure Software Engineering Perspective
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
 
Designing a security policy to protect your automation solution
Designing a security policy to protect your automation solutionDesigning a security policy to protect your automation solution
Designing a security policy to protect your automation solution
 
Information Technology Question.pdf
Information Technology Question.pdfInformation Technology Question.pdf
Information Technology Question.pdf
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
 
System Security Sem 2(Module 1).pptx
System Security Sem 2(Module     1).pptxSystem Security Sem 2(Module     1).pptx
System Security Sem 2(Module 1).pptx
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
 
IDS Research
IDS ResearchIDS Research
IDS Research
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdf
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence System
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
 
OSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint SecurityOSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint Security
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
 

More from MEN Micro

5 Things to Know about Conduction Cooling (CCA)
5 Things to Know about Conduction Cooling (CCA)5 Things to Know about Conduction Cooling (CCA)
5 Things to Know about Conduction Cooling (CCA)MEN Micro
 
5 Things to Know about FPGAs in Safety-Critical Environments
5 Things to Know about FPGAs in Safety-Critical Environments5 Things to Know about FPGAs in Safety-Critical Environments
5 Things to Know about FPGAs in Safety-Critical EnvironmentsMEN Micro
 
5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...
5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...
5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...MEN Micro
 
5 Things about IP Classes in Rugged Embedded Computing
5 Things about IP Classes in Rugged Embedded Computing5 Things about IP Classes in Rugged Embedded Computing
5 Things about IP Classes in Rugged Embedded ComputingMEN Micro
 
5 Things to Know About Conduction Cooling (CCA)
5 Things to Know About Conduction Cooling (CCA)5 Things to Know About Conduction Cooling (CCA)
5 Things to Know About Conduction Cooling (CCA)MEN Micro
 
Rugged Connectivity - Networking Devices for IoT-Applications
Rugged Connectivity - Networking Devices for IoT-ApplicationsRugged Connectivity - Networking Devices for IoT-Applications
Rugged Connectivity - Networking Devices for IoT-ApplicationsMEN Micro
 
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...MEN Micro
 
5 Things to Know about Safety-Critical Applications in Aerospace
5 Things to Know about Safety-Critical Applications in Aerospace5 Things to Know about Safety-Critical Applications in Aerospace
5 Things to Know about Safety-Critical Applications in AerospaceMEN Micro
 
10 Frequently asked Questions about Safe Train Control System menTCS
10 Frequently asked Questions about Safe Train Control System menTCS10 Frequently asked Questions about Safe Train Control System menTCS
10 Frequently asked Questions about Safe Train Control System menTCSMEN Micro
 
Modular Train Control System menTCS
Modular Train Control System menTCSModular Train Control System menTCS
Modular Train Control System menTCSMEN Micro
 
A25 – High-Performance VMEbus SBC with Intel Xeon D
A25 – High-Performance VMEbus SBC with Intel Xeon DA25 – High-Performance VMEbus SBC with Intel Xeon D
A25 – High-Performance VMEbus SBC with Intel Xeon DMEN Micro
 
5 Application Examples Using Wireless Communication in Harsh IoT Environments
5 Application Examples Using Wireless Communication in Harsh IoT Environments5 Application Examples Using Wireless Communication in Harsh IoT Environments
5 Application Examples Using Wireless Communication in Harsh IoT EnvironmentsMEN Micro
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded SystemsMEN Micro
 
5 Things to Know about Virtualization on Compact PCI Serial
5 Things to Know about Virtualization on Compact PCI Serial5 Things to Know about Virtualization on Compact PCI Serial
5 Things to Know about Virtualization on Compact PCI SerialMEN Micro
 
5 Things to Know about MENs Rugged Industrial Ethernet Switch Family
5 Things to Know about MENs Rugged Industrial Ethernet Switch Family5 Things to Know about MENs Rugged Industrial Ethernet Switch Family
5 Things to Know about MENs Rugged Industrial Ethernet Switch FamilyMEN Micro
 
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile Communication
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile CommunicationBL51E – Rugged Box PC with Intel Apollo Lake I for Mobile Communication
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile CommunicationMEN Micro
 
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26LMEN Micro
 
5 Things to Know about the CB30 Rugged COM Express Safe Computer
5 Things to Know about the CB30 Rugged COM Express Safe Computer5 Things to Know about the CB30 Rugged COM Express Safe Computer
5 Things to Know about the CB30 Rugged COM Express Safe ComputerMEN Micro
 
5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCSMEN Micro
 
5 Things to Know about the F75P
5 Things to Know about the F75P5 Things to Know about the F75P
5 Things to Know about the F75PMEN Micro
 

More from MEN Micro (20)

5 Things to Know about Conduction Cooling (CCA)
5 Things to Know about Conduction Cooling (CCA)5 Things to Know about Conduction Cooling (CCA)
5 Things to Know about Conduction Cooling (CCA)
 
5 Things to Know about FPGAs in Safety-Critical Environments
5 Things to Know about FPGAs in Safety-Critical Environments5 Things to Know about FPGAs in Safety-Critical Environments
5 Things to Know about FPGAs in Safety-Critical Environments
 
5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...
5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...
5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...
 
5 Things about IP Classes in Rugged Embedded Computing
5 Things about IP Classes in Rugged Embedded Computing5 Things about IP Classes in Rugged Embedded Computing
5 Things about IP Classes in Rugged Embedded Computing
 
5 Things to Know About Conduction Cooling (CCA)
5 Things to Know About Conduction Cooling (CCA)5 Things to Know About Conduction Cooling (CCA)
5 Things to Know About Conduction Cooling (CCA)
 
Rugged Connectivity - Networking Devices for IoT-Applications
Rugged Connectivity - Networking Devices for IoT-ApplicationsRugged Connectivity - Networking Devices for IoT-Applications
Rugged Connectivity - Networking Devices for IoT-Applications
 
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...
 
5 Things to Know about Safety-Critical Applications in Aerospace
5 Things to Know about Safety-Critical Applications in Aerospace5 Things to Know about Safety-Critical Applications in Aerospace
5 Things to Know about Safety-Critical Applications in Aerospace
 
10 Frequently asked Questions about Safe Train Control System menTCS
10 Frequently asked Questions about Safe Train Control System menTCS10 Frequently asked Questions about Safe Train Control System menTCS
10 Frequently asked Questions about Safe Train Control System menTCS
 
Modular Train Control System menTCS
Modular Train Control System menTCSModular Train Control System menTCS
Modular Train Control System menTCS
 
A25 – High-Performance VMEbus SBC with Intel Xeon D
A25 – High-Performance VMEbus SBC with Intel Xeon DA25 – High-Performance VMEbus SBC with Intel Xeon D
A25 – High-Performance VMEbus SBC with Intel Xeon D
 
5 Application Examples Using Wireless Communication in Harsh IoT Environments
5 Application Examples Using Wireless Communication in Harsh IoT Environments5 Application Examples Using Wireless Communication in Harsh IoT Environments
5 Application Examples Using Wireless Communication in Harsh IoT Environments
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems
 
5 Things to Know about Virtualization on Compact PCI Serial
5 Things to Know about Virtualization on Compact PCI Serial5 Things to Know about Virtualization on Compact PCI Serial
5 Things to Know about Virtualization on Compact PCI Serial
 
5 Things to Know about MENs Rugged Industrial Ethernet Switch Family
5 Things to Know about MENs Rugged Industrial Ethernet Switch Family5 Things to Know about MENs Rugged Industrial Ethernet Switch Family
5 Things to Know about MENs Rugged Industrial Ethernet Switch Family
 
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile Communication
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile CommunicationBL51E – Rugged Box PC with Intel Apollo Lake I for Mobile Communication
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile Communication
 
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L
 
5 Things to Know about the CB30 Rugged COM Express Safe Computer
5 Things to Know about the CB30 Rugged COM Express Safe Computer5 Things to Know about the CB30 Rugged COM Express Safe Computer
5 Things to Know about the CB30 Rugged COM Express Safe Computer
 
5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS
 
5 Things to Know about the F75P
5 Things to Know about the F75P5 Things to Know about the F75P
5 Things to Know about the F75P
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 

5 Things to Know about Safety and Security of Embedded Systems

  • 1. 5 Thingsto Know about Safety and Security of Embedded Systems
  • 2. Done by MEN A secure system is one where the features are relatively inaccessible to unauthorized users, therefore the system is protected. A safe system needs to be secure, whereas, a secure system may not need to be safe depending on the application. Safety and Security of Embedded Systems
  • 3. 1. What are the main characteristics of a safe embedded system? 2. What are the main characteristics of a secure embedded system? 3. What are the major provisions to make an embedded system safe? 4. What are the major provisions to make an embedded system secure? 5. What are the security measures for a safe embedded system? Safety and Security of Embedded Systems
  • 4. 1. What are the main characteristics of a safe embedded system?
  • 5. 1. What are the main characteristics of a safe embedded system? Safety-critical applications require safe embedded system architectures with a predictable failure behavior to prevent from loss of life, substantial financial damage or severe harm to the environment. As a safe system is not likely to cause such heavy damages, there must be measures defined that intervene in case of any malfunction. The complex architecture of such systems usually requires equally complex hardware, software, development rules, followed by a strict certification process.
  • 6. 2. What are the main characteristics of a secure embedded system?
  • 7. The security of embedded systems deals with the protection of the data they store, access to and communicate with the world – reducing vulnerabilities of hardware and software. High assurance embedded computing is necessary for the security, integrity, confidentiality and high availability of the application, especially with the increasing importance of the IoT and trends like BYOD. Building protection into the device itself provides security before the corporate firewall. Security needs to be considered early in the design of a new system and may even be customized according to the requirements of the application. 2. What are the main characteristics of a secure embedded system?
  • 8. 3. What are the major provisions to make an embedded system safe?
  • 9. » Fail-Safe Behavior. In case of a serious failure, the system enters a defined safe state. If it is fail-silent, it shuts down completely. » Redundancy. Multiplying critical components, such as the CPU, increases the function‘s reliability. » Clustering. This does not increase a subsystem‘s safety, but it raises availability. Backing up a system is using redundancy on a higher level with the aim of keeping your system up even in case of a failure. 3. What are the major provisions to make an embedded system safe?
  • 10. » Radiation Resistance. Cosmic radiation can cause memory errors in airborne applications. Special design can prevent effects like Single Event Upsets (SEU) in FPGA and memory components. » Supervisors. Board management and supervision in safe computers need to go beyond the usual CPU functions. A reliable CPU should have a dedicated monitor at its side rather than supervise itself. » Diversity. If redundant components are identical, a common cause can make them fail. This is why a system must support dissimilarities both in hardware and in software, e.g., diversely built up I/O or different operating systems on redundant processors. 3. What are the major provisions to make an embedded system safe?
  • 11. » Determinism. The need for predictable behavior forbids a number of mechanisms, like interrupts, common in non-critical applications. Design engineers need particular expertise in this respect. » Event Logging. While this is not a necessary safety function, it can help track back faults in critical systems in case of an incident. Chances are higher to avoid the error cause in the future by taking precautions. 3. What are the major provisions to make an embedded system safe?
  • 12. 4. What are the major provisions to make an embedded system secure?
  • 13. » Threat prevention, detection, and response. User account access controls and cryptography can protect systems files and data. Firewalls prevent systems from a network security perspective. Intrusion detection systems are designed to detect network attacks in progress. Response is the summary of methods to effectively protect the system from harm. 4. What are the major provisions to make an embedded system secure?
  • 14. » Software-based and hardware-based security. Hardware-based or assisted computer security offers an alternative to software-only computer security: » TPM. Trusted platform modules secure devices by integrating crypto- graphic capabilities on processors and SOCs. Used together with ser- ver-side software, TPMs detect and authenticate hardware devices, preventing unauthorized access. » Secure boot. Based on hardware support, this method uses cryptographically signed code to verify authentication. 4. What are the major provisions to make an embedded system secure?
  • 15. » Intrusion detection/prevention. As a hardware or software implemented function, IDS triggers an alarm, whereas IPS is capable of interrupting the connection, modifying or destroying data packages. » Drive locks. Drive locks are software tools to encrypt internal and external hard drives, making them inaccessible to unauthorized parties. » USB dongle. It creates a secure encrypted tunnel between the software application and the key, or can be used to access web-based content, or can be configured to lock or unlock a computer. 4. What are the major provisions to make an embedded system secure?
  • 16. » Disabling USB ports. This is another security option to prevent from hostile access. » Device tampering. This detection method shows when the seal on the device enclosure has been broken, indicating that a not authorizated person may be violating the system. » Firewall. A firewall is – in addition to the more specific hardware protection – a software layer to defend against common attacks. » Security patches and updates. Being part of the vulnerability management, security patches are the primary method of fixing security weaknesses in software. 4. What are the major provisions to make an embedded system secure?
  • 17. 5. What are the security measures for a safe embedded system?
  • 18. Safe embedded systems control critical functions in industrial automation, transportation, and other markets, where a collapse of the system caused by an external attack could have catastrophic consequences. And – critical embedded systems are often deployed in the field or even mobile, being may be directly connected to the Internet with none of the protections found in a corporate environment. 5. What are the security measures for a safe embedded system?
  • 19. » Up to now the preferred method is still to keep a safe system away from standard networks, the Internet or the Cloud. » To exchange operation data between a safe computer and open networks, “vital-to-non-vital” gateways may be one way to achieve the security needed. With no extra security measures for safe embedded systems yet on the horizon, it is said that at least physical computer attacks and social engineering can only be prevented by non-computer means, e.g. with trainings of the personnel. 5. What are the security measures for a safe embedded system?