Skip to the content.

Embedded Systems

Embedded Systems

Embedded systems are specialized computing systems designed to perform specific functions within larger systems or devices. They are typically built with microcontrollers or microprocessors and are embedded into products to control and monitor various operations.

Examples:

Embedded systems often operate in real-time and have resource constraints such as limited memory, processing power, and energy.

Types of Embedded Systems

Types:

Real Time Operating Systems

An RTOS is an operating system designed to manage real-time tasks with strict timing requirements. It provides services such as task scheduling, memory management, and inter-task communication, optimized for deterministic and predictable behavior. RTOSes are commonly used in embedded systems and applications where timing and responsiveness are critical.

Key characteristics:

Risks

Securing Embedded Systems

Internet of Things

A network of interconnected devices, sensors, and actuators that communicate and exchange data over the internet, enabling remote monitoring, control, and automation of physical objects and environments

Components

Risks

Securing IoT

ICS and SCADA Systems

ICS

Industrial Control Systems or ICS is a type of control systems used to monitor and control industrial processes ranging from simple systems to complex systems.

SCADA

SCADA (Supervisory Control and Data Acquisition) is a system used to remotely monitor, control, and manage industrial processes and infrastructure.

Risks

Securing ICS and SCADA Systems

Mobile Systems

Mobile Device Wireless Communications:

GPS

GPS (Global Positioning System) is a satellite-based navigation system that provides precise location and time information to users worldwide. It consists of a network of satellites orbiting the Earth and user receivers that calculate their position using signals from these satellites.

Security Implications:

Cellular 4G

4G, or fourth-generation, cellular technology is a wireless communication standard that offers faster data speeds, improved reliability, and enhanced capabilities compared to previous generations.

Security Implications:

Cellular 5G

5G, or fifth-generation, cellular technology is the latest standard in wireless communication, succeeding 4G. 5G networks leverage advanced technologies such as millimeter-wave frequencies, massive MIMO (Multiple Input Multiple Output), and network slicing to deliver high-bandwidth, low-latency connectivity for a wide range of applications.

Security Implications of 5G:

WiFi Direct

WiFi Direct is a peer-to-peer wireless technology that allows devices to connect and communicate with each other directly, without the need for a traditional WiFi network or internet connection.

Mobile Device Tethering

Mobile device tethering, also known as mobile hotspot or internet sharing, allows a smartphone or tablet to share its cellular data connection with other devices such as laptops, tablets, or gaming consoles.

Mobile Device Constraints

SIM Cards

Subscribe Identity Modules (SIM) cards authenticates device to carrier network. It contains the following data:

Carrier Unlock

Securing Mobile Devices

For more details, please see Mobile Asset Deployments.

Hardening Mobile Devices


Back to main page