Security Threats
Besides well-publicized risks including identity theft, denial of service attacks, and business systems hacking, there is a recognition that systematic attacks are taking place not only from cyber criminals but also from foreign entities to steal high tech data and trade secrets. This erodes our economic value and investment in innovation. Today, we are increasingly concerned about the vulnerability of our energy and transportation infrastructure that is dependent on digital electronics and network communications.
What makes the internet by its very nature democratic and open access, also makes it vulnerable to sophisticated and agile cyber threats. Study after study estimates the global costs of cyber crime in the hundreds of billions of dollars and climbing. The direct and indirect risks of doing nothing is much higher than the cost of adding cybersecurity.
Embedded systems must include cybersecurity defenses to protect them against disruption and to insure orderly operation.
Project Security Review and Planning
We find from our industry experience and customer feedback that end-users are looking for a supplier that can deliver a comprehensive solution. Security requires expert knowledge and best practice experience. With our diverse portfolio, we can help guide the user through system tradeoff analysis and identify the right solution to meet security requirements.
Our uSSL and uSSH SDKs provide strong authentication and security at the application level, and for many embedded systems are a perfect solution to meet the right balance of security, memory footprint and performance. Beyond that, some products and industry sectors call for the security solution to be embedded at system level directly in the TCP/IP stack. For those applications, our uVPN SDK offers a unified solution combining IKE and IPsec network encryption, along with firewall defense, using a common set of policies that include IP, port and protocol. These policies firewall and block low level connections to the device, and monitor traffic flows through the device. The uVPN combined solution not only firewalls network access, but also encrypts network traffic to insure a high level of system security. Finally, our uLoad secure bootloader authenticates and secures device software to defend against reverse engineering. This includes board authentication to prevent counterfeiting and piracy.
Security Training and Webinars
Cypherbridge also offers Embedded Security training, presentations and webinars. Embedded systems offer many opportunities to manage large infrastructure systems, small devices and many products in between. However, these systems are increasingly vulnerable and at risk for data breaches, corruption and other security threats. Learn how the unique vulnerabilities in embedded systems are commonly exploited and discover strategies and techniques for designing effective cyber security measures into products.
Security Threats
- Destruction of information and other resources
- Corruption or modification of information
- Theft, removal or loss of information and other resources
- Disclosure of information
- Interruption of services
Security Measures
- Access control
- Authentication
- Non-repudiation
- Data confidentiality
- Communication security
- Data integrity
- Availability
- Privacy
From Cypherbridge/Hitex Webinar Presentation: “Embedded Security”
For more information about Security training or webinars, please contact us!