Course Outline

Introduction

  • Security considerations versus embedded systems security

Characteristics of Embedded Application Security

  • Embedded network transactions for government applications
  • Automotive security in public sector vehicles
  • Security on Android devices used by government agencies
  • Next-generation software-defined radio for secure communications

Critical Aspects of an Embedded System

  • Microkernel architecture versus monolithic systems
  • Independent security levels to ensure data integrity
  • Core security requirements for government use
  • Access control mechanisms for secure operations
  • I/O virtualization to enhance system isolation

Performing Threat Modeling and Assessment

  • Identifying attackers and assets within the public sector environment
  • Evaluating the attack surface of government systems
  • Creating attack trees to understand potential vulnerabilities
  • Establishing a comprehensive security policy for government operations

Developing Secure Embedded Software

  • Implementing secure coding principles in government projects
  • Designing secure programs for robustness and reliability
  • Adopting minimal implementation to reduce attack surfaces
  • Utilizing component architecture for modular security
  • Applying the principle of least privilege in system design
  • Following a secure development process for government applications
  • Conducting independent expert validation to ensure compliance
  • Using model-driven design to enhance security
  • Performing code review and static analysis for quality assurance
  • Implementing security testing protocols
  • Fostering peer code reviews to identify potential issues

Understanding and Implementing Cryptography

  • Selecting appropriate cryptographic modes for government use
  • Utilizing cryptographic hashes to ensure data integrity
  • Achieving cryptographic certifications for compliance
  • Managing keys securely in public sector systems
  • Implementing block ciphers for encryption
  • Using Message Authentication Codes (MACs) to verify data authenticity
  • Generating random numbers for secure operations

Data Protection

  • Data-in-motion protocols for secure government communications
  • Securing data in motion through encrypted channels
  • Data-at-rest protocols to protect stored information
  • Securing data at rest using robust encryption methods

Mitigating Attacks

  • Identifying and mitigating common software attacks in government systems
  • Preventing side-channel attacks through advanced techniques

Retrofitting Security in Existing Projects

  • Securing bootloaders and firmware updates for enhanced system integrity

Summary and Next Steps

Requirements

  • Experience with embedded systems development for government.

Audience

  • Embedded systems professionals
  • Security professionals
 21 Hours

Number of participants


Price per participant

Testimonials (2)

Upcoming Courses

Related Categories