<´╗┐img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=112631&fmt=gif" />


A Survey of Information Security Implementations for Embedded Systems

Different embedded devices, systems, and industries have varying security requirements and often require a custom lens. This paper will provide an introductory-level explanation of the CIA triad implementations based on confidentiality, integrity, and availability, and how each relates to an embedded device and system.


  • Security implementations of the CIA triad as applied to embedded systems
  • How these implementations can be used to defend against various attacks against embedded systems
  • How a defense-in-depth approach is used to secure an embedded system