Understanding secure connectivity in embedded systems and IoT devices

電子郵件

Understanding security threats to embedded systems and IoT devices

描述

2019年 12月 27日

This video summarizes why hackers might attack an embedded device followed by a short overview of remote and physical attack methods. It then discusses four actual attacks on embedded systems, such as point of sales terminals and smart meters, detailing the weaknesses that the attack exploited to gain control or access to the system.

其他資訊

arrow-topclosedeletedownloadmenusearchsortingArrowszoom-inzoom-out arrow-downarrow-uparrowCircle-leftarrowCircle-rightblockDiagramcalculatorcalendarchatBubble-doublechatBubble-personchatBubble-singlecheckmark-circlechevron-downchevron-leftchevron-rightchevron-upchipclipboardclose-circlecrossReferencedashdocument-genericdocument-pdfAcrobatdocument-webevaluationModuleglobehistoryClockinfo-circlelistlockmailmyTIonlineDataSheetpersonphonequestion-circlereferenceDesignshoppingCartstartoolsvideoswarningwiki