SlideShare a Scribd company logo
5 Thingsto Know about
	 Safety and Security of
Embedded Systems
Done by MEN
A secure system is one where the features are
relatively inaccessible to unauthorized users,
therefore the system is protected.
A safe system needs to be secure, whereas,
a secure system may not need to be safe
depending on the application.
Safety and Security of Embedded Systems
1. 	What are the main characteristics of a safe embedded system?
2. 	What are the main characteristics of a secure embedded system?
3. 	What are the major provisions to make an embedded system safe?
4. 	What are the major provisions to make an embedded system secure?
5. 	What are the security measures for a safe embedded system?
Safety and Security of Embedded Systems
1.
What are the main characteristics
of a safe embedded system?
1. What are the main characteristics of a safe embedded system?
Safety-critical applications require safe embedded system architectures
with a predictable failure behavior to prevent from loss of life, substantial
financial damage or severe harm to the environment.
As a safe system is not likely to cause such heavy damages, there must be
measures defined that intervene in case of any malfunction.
The complex architecture of such systems usually requires equally complex
hardware, software, development rules, followed by a strict certification
process.
2.
What are the main characteristics
of a secure embedded system?
The security of embedded systems deals with the protection of the
data they store, access to and communicate with the world – reducing
vulnerabilities of hardware and software.
High assurance embedded computing is necessary for the security,
integrity, confidentiality and high availability of the application, especially
with the increasing importance of the IoT and trends like BYOD.
Building protection into the device itself provides security before the
corporate firewall. Security needs to be considered early in the design of a
new system and may even be customized according to the requirements
of the application.
2. What are the main characteristics of a secure embedded system?
3.
What are the major provisions
to make an embedded system safe?
» Fail-Safe Behavior. In case of a serious failure, the system enters a defined
safe state. If it is fail-silent, it shuts down completely.
» Redundancy. Multiplying critical components, such as the CPU, increases
the function‘s reliability.
» Clustering. This does not increase a subsystem‘s safety, but it raises
availability. Backing up a system is using redundancy on a higher level with
the aim of keeping your system up even in case of a failure.
3. What are the major provisions to make an embedded system safe?
» Radiation Resistance. Cosmic radiation can cause memory errors in
airborne applications. Special design can prevent effects like Single Event
Upsets (SEU) in FPGA and memory components.
» Supervisors. Board management and supervision in safe computers
need to go beyond the usual CPU functions. A reliable CPU should have a
dedicated monitor at its side rather than supervise itself.
» Diversity. If redundant components are identical, a common cause can
make them fail. This is why a system must support dissimilarities both in
hardware and in software, e.g., diversely built up I/O or different operating
systems on redundant processors.
3. What are the major provisions to make an embedded system safe?
» Determinism. The need for predictable behavior forbids a number of
mechanisms, like interrupts, common in non-critical applications. Design
engineers need particular expertise in this respect.
» Event Logging. While this is not a necessary safety function, it can help
track back faults in critical systems in case of an incident. Chances are
higher to avoid the error cause in the future by taking precautions.
3. What are the major provisions to make an embedded system safe?
4.
What are the major provisions
to make an embedded system secure?
» Threat prevention, detection, and response. User account access controls
and cryptography can protect systems files and data. Firewalls prevent
systems from a network security perspective. Intrusion detection systems
are designed to detect network attacks in progress. Response is the
summary of methods to effectively protect the system from harm.
4. What are the major provisions to make an embedded system secure?
» Software-based and hardware-based security. Hardware-based or assisted
computer security offers an alternative to software-only computer
security:
» TPM. Trusted platform modules secure devices by integrating crypto-
graphic capabilities on processors and SOCs. Used together with ser-
ver-side software, TPMs detect and authenticate hardware devices,
preventing unauthorized access.
		» Secure boot. Based on hardware support, this method uses
cryptographically signed code to verify authentication.
4. What are the major provisions to make an embedded system secure?
» Intrusion detection/prevention. As a hardware or software
implemented function, IDS triggers an alarm, whereas IPS is capable of
interrupting the connection, modifying or destroying data packages.
		» Drive locks. Drive locks are software tools to encrypt internal and
external hard drives, making them inaccessible to unauthorized
parties.
		» USB dongle. It creates a secure encrypted tunnel between the
software application and the key, or can be used to access web-based
content, or can be configured to lock or unlock a computer.
4. What are the major provisions to make an embedded system secure?
» Disabling USB ports. This is another security option to prevent from
hostile access.
		» Device tampering. This detection method shows when the seal on the
device enclosure has been broken, indicating that a not authorizated
person may be violating the system.
		» Firewall. A firewall is – in addition to the more specific hardware
protection – a software layer to defend against common attacks.
		» Security patches and updates. Being part of the vulnerability
management, security patches are the primary method of fixing
security weaknesses in software.
4. What are the major provisions to make an embedded system secure?
5.
What are the security measures
for a safe embedded system?
Safe embedded systems control critical functions in industrial automation,
transportation, and other markets, where a collapse of the system caused
by an external attack could have catastrophic consequences. And – critical
embedded systems are often deployed in the field or even mobile, being
may be directly connected to the Internet with none of the protections
found in a corporate environment.
5. What are the security measures for a safe embedded system?
» Up to now the preferred method is still to keep a safe system away from
standard networks, the Internet or the Cloud.
» To exchange operation data between a safe computer and open
networks, “vital-to-non-vital” gateways may be one way to achieve the
security needed.
With no extra security measures for safe embedded systems yet on
the horizon, it is said that at least physical computer attacks and social
engineering can only be prevented by non-computer means, e.g. with
trainings of the personnel.
5. What are the security measures for a safe embedded system?
www.men.de/competencies/safe-computing/
www.men-france.fr/competencies/safe-computing/
www.menmicro.com/competencies/safe-computing/

More Related Content

What's hot

Network security ppt
Network security pptNetwork security ppt
Operating system structures
Operating system structuresOperating system structures
Operating system structures
Mohd Arif
 
Computing Environment
Computing EnvironmentComputing Environment
Computing Environment
kem warren
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
Nisarg Amin
 
Basic Computer Operation And Troubleshooting
Basic  Computer  Operation And  TroubleshootingBasic  Computer  Operation And  Troubleshooting
Basic Computer Operation And Troubleshooting
Praveen Sudarsan
 
Security policies
Security policiesSecurity policies
Security policies
Nishant Pahad
 
Fault tolerance and computing
Fault tolerance  and computingFault tolerance  and computing
Fault tolerance and computing
Palani murugan
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment Industry
Narudom Roongsiriwong, CISSP
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
Pruthvi Monarch
 
Fundamentals of operating system
Fundamentals of operating systemFundamentals of operating system
Fundamentals of operating system
Jayesh Chauhan
 
C++ How to program
C++ How to programC++ How to program
C++ How to program
Mohammad Golyani
 
Characteristics of cloud computing
Characteristics of cloud computingCharacteristics of cloud computing
Characteristics of cloud computing
GOVERNMENT COLLEGE OF ENGINEERING,TIRUNELVELI
 
Infrastructure security
Infrastructure security Infrastructure security
Infrastructure security
Adhar kashyap
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
John Ely Masculino
 
20CS2021 DISTRIBUTED COMPUTING
20CS2021 DISTRIBUTED COMPUTING20CS2021 DISTRIBUTED COMPUTING
20CS2021 DISTRIBUTED COMPUTING
Kathirvel Ayyaswamy
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
Sibghatullah Khattak
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
Ramesh Upadhaya
 
Cloud security
Cloud securityCloud security
Cloud security
Tushar Kayande
 
Ports and connectors
Ports and connectorsPorts and connectors
Ports and connectors
chrispaul8676
 
Fault tolerance
Fault toleranceFault tolerance
Fault tolerance
Gaurav Rawat
 

What's hot (20)

Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Operating system structures
Operating system structuresOperating system structures
Operating system structures
 
Computing Environment
Computing EnvironmentComputing Environment
Computing Environment
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Basic Computer Operation And Troubleshooting
Basic  Computer  Operation And  TroubleshootingBasic  Computer  Operation And  Troubleshooting
Basic Computer Operation And Troubleshooting
 
Security policies
Security policiesSecurity policies
Security policies
 
Fault tolerance and computing
Fault tolerance  and computingFault tolerance  and computing
Fault tolerance and computing
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment Industry
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Fundamentals of operating system
Fundamentals of operating systemFundamentals of operating system
Fundamentals of operating system
 
C++ How to program
C++ How to programC++ How to program
C++ How to program
 
Characteristics of cloud computing
Characteristics of cloud computingCharacteristics of cloud computing
Characteristics of cloud computing
 
Infrastructure security
Infrastructure security Infrastructure security
Infrastructure security
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
20CS2021 DISTRIBUTED COMPUTING
20CS2021 DISTRIBUTED COMPUTING20CS2021 DISTRIBUTED COMPUTING
20CS2021 DISTRIBUTED COMPUTING
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
 
Cloud security
Cloud securityCloud security
Cloud security
 
Ports and connectors
Ports and connectorsPorts and connectors
Ports and connectors
 
Fault tolerance
Fault toleranceFault tolerance
Fault tolerance
 

Similar to 5 Things to Know about Safety and Security of Embedded Systems

Understanding security operation.pptx
Understanding security operation.pptxUnderstanding security operation.pptx
Understanding security operation.pptx
Piyush Jain
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should Know
Nuuko, Inc.
 
Part 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docxPart 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docx
danhaley45372
 
A Secure Software Engineering Perspective
A Secure Software Engineering PerspectiveA Secure Software Engineering Perspective
A Secure Software Engineering Perspective
idescitation
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
Clearnetwork
 
Designing a security policy to protect your automation solution
Designing a security policy to protect your automation solutionDesigning a security policy to protect your automation solution
Designing a security policy to protect your automation solution
Schneider Electric India
 
Information Technology Question.pdf
Information Technology Question.pdfInformation Technology Question.pdf
Information Technology Question.pdf
bkbk37
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
Pace IT at Edmonds Community College
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
Muhammad Asim
 
System Security Sem 2(Module 1).pptx
System Security Sem 2(Module     1).pptxSystem Security Sem 2(Module     1).pptx
System Security Sem 2(Module 1).pptx
rahulkumarcscsf21
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
Rodrigo Piovesana
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
Emmanuel Oshogwe Akpeokhai
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
Piyush Jain
 
IDS Research
IDS ResearchIDS Research
IDS Research
Yehan Gunaratne
 
Threats To The System
Threats To The SystemThreats To The System
Threats To The System
Steven Cahill
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdf
anandanand521251
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
aizazhussain234
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence System
Joseph Yosi Margalit
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET Journal
 
OSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint SecurityOSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint Security
Ivanti
 

Similar to 5 Things to Know about Safety and Security of Embedded Systems (20)

Understanding security operation.pptx
Understanding security operation.pptxUnderstanding security operation.pptx
Understanding security operation.pptx
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should Know
 
Part 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docxPart 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docx
 
A Secure Software Engineering Perspective
A Secure Software Engineering PerspectiveA Secure Software Engineering Perspective
A Secure Software Engineering Perspective
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
 
Designing a security policy to protect your automation solution
Designing a security policy to protect your automation solutionDesigning a security policy to protect your automation solution
Designing a security policy to protect your automation solution
 
Information Technology Question.pdf
Information Technology Question.pdfInformation Technology Question.pdf
Information Technology Question.pdf
 
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host SecurityPACE-IT, Security+ 4.3: Solutions to Establish Host Security
PACE-IT, Security+ 4.3: Solutions to Establish Host Security
 
Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
 
System Security Sem 2(Module 1).pptx
System Security Sem 2(Module     1).pptxSystem Security Sem 2(Module     1).pptx
System Security Sem 2(Module 1).pptx
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
 
IDS Research
IDS ResearchIDS Research
IDS Research
 
Threats To The System
Threats To The SystemThreats To The System
Threats To The System
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdf
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence System
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
 
OSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint SecurityOSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint Security
 

More from MEN Mikro Elektronik GmbH

5 Things to Know about Conduction Cooling (CCA)
5 Things to Know about Conduction Cooling (CCA)5 Things to Know about Conduction Cooling (CCA)
5 Things to Know about Conduction Cooling (CCA)
MEN Mikro Elektronik GmbH
 
5 choses à savoir sur le refroidissement par conduction (CCA)
5 choses à savoir sur le refroidissement par conduction (CCA)5 choses à savoir sur le refroidissement par conduction (CCA)
5 choses à savoir sur le refroidissement par conduction (CCA)
MEN Mikro Elektronik GmbH
 
5 wissenswerte Fakten zu Conduction Cooling (CCA)
5 wissenswerte Fakten zu Conduction Cooling (CCA)5 wissenswerte Fakten zu Conduction Cooling (CCA)
5 wissenswerte Fakten zu Conduction Cooling (CCA)
MEN Mikro Elektronik GmbH
 
5 Fakten über den F75P: Embedded Computer für sicherheitskritische Anwendungen
5 Fakten über den F75P: Embedded Computer für sicherheitskritische Anwendungen5 Fakten über den F75P: Embedded Computer für sicherheitskritische Anwendungen
5 Fakten über den F75P: Embedded Computer für sicherheitskritische Anwendungen
MEN Mikro Elektronik GmbH
 
5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...
5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...
5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...
MEN Mikro Elektronik GmbH
 
3 Dinge über robuste Panel-PCs von MEN
3 Dinge über robuste Panel-PCs von MEN3 Dinge über robuste Panel-PCs von MEN
3 Dinge über robuste Panel-PCs von MEN
MEN Mikro Elektronik GmbH
 
3 points à connaître sur les Panel PC robustes de MEN
3 points à connaître sur les Panel PC robustes de MEN 3 points à connaître sur les Panel PC robustes de MEN
3 points à connaître sur les Panel PC robustes de MEN
MEN Mikro Elektronik GmbH
 
Rugged Connectivity - Networking Devices for IoT-Applications
Rugged Connectivity - Networking Devices for IoT-ApplicationsRugged Connectivity - Networking Devices for IoT-Applications
Rugged Connectivity - Networking Devices for IoT-Applications
MEN Mikro Elektronik GmbH
 
9 Things to Know about MEN’s Rugged Industrial & Railway Ethernet Switches
9 Things to Know about MEN’s Rugged Industrial & Railway Ethernet Switches9 Things to Know about MEN’s Rugged Industrial & Railway Ethernet Switches
9 Things to Know about MEN’s Rugged Industrial & Railway Ethernet Switches
MEN Mikro Elektronik GmbH
 
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...
MEN Mikro Elektronik GmbH
 
5 Things to Know about Safety-Critical Applications in Aerospace
5 Things to Know about Safety-Critical Applications in Aerospace5 Things to Know about Safety-Critical Applications in Aerospace
5 Things to Know about Safety-Critical Applications in Aerospace
MEN Mikro Elektronik GmbH
 
10 Frequently asked Questions about Safe Train Control System menTCS
10 Frequently asked Questions about Safe Train Control System menTCS10 Frequently asked Questions about Safe Train Control System menTCS
10 Frequently asked Questions about Safe Train Control System menTCS
MEN Mikro Elektronik GmbH
 
5 Application Examples Using Wireless Communication in Harsh IoT Environments
5 Application Examples Using Wireless Communication in Harsh IoT Environments5 Application Examples Using Wireless Communication in Harsh IoT Environments
5 Application Examples Using Wireless Communication in Harsh IoT Environments
MEN Mikro Elektronik GmbH
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems
MEN Mikro Elektronik GmbH
 
5 Things to Know about Virtualization on Compact PCI Serial
5 Things to Know about Virtualization on Compact PCI Serial5 Things to Know about Virtualization on Compact PCI Serial
5 Things to Know about Virtualization on Compact PCI Serial
MEN Mikro Elektronik GmbH
 
5 Things to Know about MENs Rugged Industrial Ethernet Switch Family
5 Things to Know about MENs Rugged Industrial Ethernet Switch Family5 Things to Know about MENs Rugged Industrial Ethernet Switch Family
5 Things to Know about MENs Rugged Industrial Ethernet Switch Family
MEN Mikro Elektronik GmbH
 
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile Communication
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile CommunicationBL51E – Rugged Box PC with Intel Apollo Lake I for Mobile Communication
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile Communication
MEN Mikro Elektronik GmbH
 
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L
MEN Mikro Elektronik GmbH
 
CB30C Rugged COM Express Safe Computer
CB30C Rugged COM Express Safe ComputerCB30C Rugged COM Express Safe Computer
CB30C Rugged COM Express Safe Computer
MEN Mikro Elektronik GmbH
 
5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS
MEN Mikro Elektronik GmbH
 

More from MEN Mikro Elektronik GmbH (20)

5 Things to Know about Conduction Cooling (CCA)
5 Things to Know about Conduction Cooling (CCA)5 Things to Know about Conduction Cooling (CCA)
5 Things to Know about Conduction Cooling (CCA)
 
5 choses à savoir sur le refroidissement par conduction (CCA)
5 choses à savoir sur le refroidissement par conduction (CCA)5 choses à savoir sur le refroidissement par conduction (CCA)
5 choses à savoir sur le refroidissement par conduction (CCA)
 
5 wissenswerte Fakten zu Conduction Cooling (CCA)
5 wissenswerte Fakten zu Conduction Cooling (CCA)5 wissenswerte Fakten zu Conduction Cooling (CCA)
5 wissenswerte Fakten zu Conduction Cooling (CCA)
 
5 Fakten über den F75P: Embedded Computer für sicherheitskritische Anwendungen
5 Fakten über den F75P: Embedded Computer für sicherheitskritische Anwendungen5 Fakten über den F75P: Embedded Computer für sicherheitskritische Anwendungen
5 Fakten über den F75P: Embedded Computer für sicherheitskritische Anwendungen
 
5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...
5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...
5 Things to Know about the F75P: a Vital Embedded Computer for Safety-Critica...
 
3 Dinge über robuste Panel-PCs von MEN
3 Dinge über robuste Panel-PCs von MEN3 Dinge über robuste Panel-PCs von MEN
3 Dinge über robuste Panel-PCs von MEN
 
3 points à connaître sur les Panel PC robustes de MEN
3 points à connaître sur les Panel PC robustes de MEN 3 points à connaître sur les Panel PC robustes de MEN
3 points à connaître sur les Panel PC robustes de MEN
 
Rugged Connectivity - Networking Devices for IoT-Applications
Rugged Connectivity - Networking Devices for IoT-ApplicationsRugged Connectivity - Networking Devices for IoT-Applications
Rugged Connectivity - Networking Devices for IoT-Applications
 
9 Things to Know about MEN’s Rugged Industrial & Railway Ethernet Switches
9 Things to Know about MEN’s Rugged Industrial & Railway Ethernet Switches9 Things to Know about MEN’s Rugged Industrial & Railway Ethernet Switches
9 Things to Know about MEN’s Rugged Industrial & Railway Ethernet Switches
 
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...
4 Things to Know about Real-Time Ethernet Communication of Safe Train Control...
 
5 Things to Know about Safety-Critical Applications in Aerospace
5 Things to Know about Safety-Critical Applications in Aerospace5 Things to Know about Safety-Critical Applications in Aerospace
5 Things to Know about Safety-Critical Applications in Aerospace
 
10 Frequently asked Questions about Safe Train Control System menTCS
10 Frequently asked Questions about Safe Train Control System menTCS10 Frequently asked Questions about Safe Train Control System menTCS
10 Frequently asked Questions about Safe Train Control System menTCS
 
5 Application Examples Using Wireless Communication in Harsh IoT Environments
5 Application Examples Using Wireless Communication in Harsh IoT Environments5 Application Examples Using Wireless Communication in Harsh IoT Environments
5 Application Examples Using Wireless Communication in Harsh IoT Environments
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems
 
5 Things to Know about Virtualization on Compact PCI Serial
5 Things to Know about Virtualization on Compact PCI Serial5 Things to Know about Virtualization on Compact PCI Serial
5 Things to Know about Virtualization on Compact PCI Serial
 
5 Things to Know about MENs Rugged Industrial Ethernet Switch Family
5 Things to Know about MENs Rugged Industrial Ethernet Switch Family5 Things to Know about MENs Rugged Industrial Ethernet Switch Family
5 Things to Know about MENs Rugged Industrial Ethernet Switch Family
 
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile Communication
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile CommunicationBL51E – Rugged Box PC with Intel Apollo Lake I for Mobile Communication
BL51E – Rugged Box PC with Intel Apollo Lake I for Mobile Communication
 
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L
5 Things to Know about the CompactPCI PlusIO Single Board Computer F26L
 
CB30C Rugged COM Express Safe Computer
CB30C Rugged COM Express Safe ComputerCB30C Rugged COM Express Safe Computer
CB30C Rugged COM Express Safe Computer
 
5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS5 Things to Know about the Train Control System menTCS
5 Things to Know about the Train Control System menTCS
 

Recently uploaded

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 

Recently uploaded (20)

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 

5 Things to Know about Safety and Security of Embedded Systems

  • 1. 5 Thingsto Know about Safety and Security of Embedded Systems
  • 2. Done by MEN A secure system is one where the features are relatively inaccessible to unauthorized users, therefore the system is protected. A safe system needs to be secure, whereas, a secure system may not need to be safe depending on the application. Safety and Security of Embedded Systems
  • 3. 1. What are the main characteristics of a safe embedded system? 2. What are the main characteristics of a secure embedded system? 3. What are the major provisions to make an embedded system safe? 4. What are the major provisions to make an embedded system secure? 5. What are the security measures for a safe embedded system? Safety and Security of Embedded Systems
  • 4. 1. What are the main characteristics of a safe embedded system?
  • 5. 1. What are the main characteristics of a safe embedded system? Safety-critical applications require safe embedded system architectures with a predictable failure behavior to prevent from loss of life, substantial financial damage or severe harm to the environment. As a safe system is not likely to cause such heavy damages, there must be measures defined that intervene in case of any malfunction. The complex architecture of such systems usually requires equally complex hardware, software, development rules, followed by a strict certification process.
  • 6. 2. What are the main characteristics of a secure embedded system?
  • 7. The security of embedded systems deals with the protection of the data they store, access to and communicate with the world – reducing vulnerabilities of hardware and software. High assurance embedded computing is necessary for the security, integrity, confidentiality and high availability of the application, especially with the increasing importance of the IoT and trends like BYOD. Building protection into the device itself provides security before the corporate firewall. Security needs to be considered early in the design of a new system and may even be customized according to the requirements of the application. 2. What are the main characteristics of a secure embedded system?
  • 8. 3. What are the major provisions to make an embedded system safe?
  • 9. » Fail-Safe Behavior. In case of a serious failure, the system enters a defined safe state. If it is fail-silent, it shuts down completely. » Redundancy. Multiplying critical components, such as the CPU, increases the function‘s reliability. » Clustering. This does not increase a subsystem‘s safety, but it raises availability. Backing up a system is using redundancy on a higher level with the aim of keeping your system up even in case of a failure. 3. What are the major provisions to make an embedded system safe?
  • 10. » Radiation Resistance. Cosmic radiation can cause memory errors in airborne applications. Special design can prevent effects like Single Event Upsets (SEU) in FPGA and memory components. » Supervisors. Board management and supervision in safe computers need to go beyond the usual CPU functions. A reliable CPU should have a dedicated monitor at its side rather than supervise itself. » Diversity. If redundant components are identical, a common cause can make them fail. This is why a system must support dissimilarities both in hardware and in software, e.g., diversely built up I/O or different operating systems on redundant processors. 3. What are the major provisions to make an embedded system safe?
  • 11. » Determinism. The need for predictable behavior forbids a number of mechanisms, like interrupts, common in non-critical applications. Design engineers need particular expertise in this respect. » Event Logging. While this is not a necessary safety function, it can help track back faults in critical systems in case of an incident. Chances are higher to avoid the error cause in the future by taking precautions. 3. What are the major provisions to make an embedded system safe?
  • 12. 4. What are the major provisions to make an embedded system secure?
  • 13. » Threat prevention, detection, and response. User account access controls and cryptography can protect systems files and data. Firewalls prevent systems from a network security perspective. Intrusion detection systems are designed to detect network attacks in progress. Response is the summary of methods to effectively protect the system from harm. 4. What are the major provisions to make an embedded system secure?
  • 14. » Software-based and hardware-based security. Hardware-based or assisted computer security offers an alternative to software-only computer security: » TPM. Trusted platform modules secure devices by integrating crypto- graphic capabilities on processors and SOCs. Used together with ser- ver-side software, TPMs detect and authenticate hardware devices, preventing unauthorized access. » Secure boot. Based on hardware support, this method uses cryptographically signed code to verify authentication. 4. What are the major provisions to make an embedded system secure?
  • 15. » Intrusion detection/prevention. As a hardware or software implemented function, IDS triggers an alarm, whereas IPS is capable of interrupting the connection, modifying or destroying data packages. » Drive locks. Drive locks are software tools to encrypt internal and external hard drives, making them inaccessible to unauthorized parties. » USB dongle. It creates a secure encrypted tunnel between the software application and the key, or can be used to access web-based content, or can be configured to lock or unlock a computer. 4. What are the major provisions to make an embedded system secure?
  • 16. » Disabling USB ports. This is another security option to prevent from hostile access. » Device tampering. This detection method shows when the seal on the device enclosure has been broken, indicating that a not authorizated person may be violating the system. » Firewall. A firewall is – in addition to the more specific hardware protection – a software layer to defend against common attacks. » Security patches and updates. Being part of the vulnerability management, security patches are the primary method of fixing security weaknesses in software. 4. What are the major provisions to make an embedded system secure?
  • 17. 5. What are the security measures for a safe embedded system?
  • 18. Safe embedded systems control critical functions in industrial automation, transportation, and other markets, where a collapse of the system caused by an external attack could have catastrophic consequences. And – critical embedded systems are often deployed in the field or even mobile, being may be directly connected to the Internet with none of the protections found in a corporate environment. 5. What are the security measures for a safe embedded system?
  • 19. » Up to now the preferred method is still to keep a safe system away from standard networks, the Internet or the Cloud. » To exchange operation data between a safe computer and open networks, “vital-to-non-vital” gateways may be one way to achieve the security needed. With no extra security measures for safe embedded systems yet on the horizon, it is said that at least physical computer attacks and social engineering can only be prevented by non-computer means, e.g. with trainings of the personnel. 5. What are the security measures for a safe embedded system?