Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction
- Security considerations versus embedded systems security
Characteristics of Embedded Application Security
- Embedded network transactions for government applications
- Automotive security in public sector vehicles
- Security on Android devices used by government agencies
- Next-generation software-defined radio for secure communications
Critical Aspects of an Embedded System
- Microkernel architecture versus monolithic systems
- Independent security levels to ensure data integrity
- Core security requirements for government use
- Access control mechanisms for secure operations
- I/O virtualization to enhance system isolation
Performing Threat Modeling and Assessment
- Identifying attackers and assets within the public sector environment
- Evaluating the attack surface of government systems
- Creating attack trees to understand potential vulnerabilities
- Establishing a comprehensive security policy for government operations
Developing Secure Embedded Software
- Implementing secure coding principles in government projects
- Designing secure programs for robustness and reliability
- Adopting minimal implementation to reduce attack surfaces
- Utilizing component architecture for modular security
- Applying the principle of least privilege in system design
- Following a secure development process for government applications
- Conducting independent expert validation to ensure compliance
- Using model-driven design to enhance security
- Performing code review and static analysis for quality assurance
- Implementing security testing protocols
- Fostering peer code reviews to identify potential issues
Understanding and Implementing Cryptography
- Selecting appropriate cryptographic modes for government use
- Utilizing cryptographic hashes to ensure data integrity
- Achieving cryptographic certifications for compliance
- Managing keys securely in public sector systems
- Implementing block ciphers for encryption
- Using Message Authentication Codes (MACs) to verify data authenticity
- Generating random numbers for secure operations
Data Protection
- Data-in-motion protocols for secure government communications
- Securing data in motion through encrypted channels
- Data-at-rest protocols to protect stored information
- Securing data at rest using robust encryption methods
Mitigating Attacks
- Identifying and mitigating common software attacks in government systems
- Preventing side-channel attacks through advanced techniques
Retrofitting Security in Existing Projects
- Securing bootloaders and firmware updates for enhanced system integrity
Summary and Next Steps
Requirements
- Experience with embedded systems development for government.
Audience
- Embedded systems professionals
- Security professionals
21 Hours
Testimonials (2)
The oral skills and human side of the trainer (Augustin).
Jeremy Chicon - TE Connectivity
Course - NB-IoT for Developers
Ann is very knowledgeable on the subject. She is constantly varying pace according to the feedback. There is a lot of room for discussing attendee's own experiences. It was a great joy !.