Application of a Technique for Secure Embedded Device Design Based on Combining Security Components for Creation of a Perimeter Protection System

From information security point of view embedded devices are the elements of complex systems operating in a potentially hostile environment. Therefore development of embedded devices is a complex task that often requires expert solutions. The complexity of the task of developing secure embedded devices is caused by various types of threats and attacks that… CONTINUE READING