A Survey of Information Security Implementations for Embedded Systems
Different embedded devices, systems, and industries have varying security requirements and often require a custom lens. This paper will provide an introductory-level explanation of the CIA triad implementations based on confidentiality, integrity, and availability, and how each relates to an embedded device and system.
- Security implementations of the CIA triad as applied to embedded systems
- How these implementations can be used to defend against various attacks against embedded systems
- How a defense-in-depth approach is used to secure an embedded system