WIBU-SYSTEMS

Perfection in Protection, Licensing, and Security

An Eye-Opening Look at Embedded Security (or Not)

MarketingWIBU-SYSTEMS AG el 7 de abril de 2017 15:30 horas

“In an eye-opening embedded systems safety and security survey conducted by the Barr Group, 28 percent of respondents said the systems they work on could cause injury or fatalities and 60 percent of the respondents said their systems were connected to the Internet. Disturbingly, even when their systems could be dangerous and were on the Internet, 22 percent of engineers said security was not a design requirement on their project.”

The statement above was made by Curt Schwaderer, Editorial Director, of Embedded Computing Design, in his article commenting on the results of the Barr Group’s third annual global survey of 1,700 professional embedded systems designers.

Eye-opening indeed.

The Barr Group concluded that “there are potentially deadly embedded systems that are not designed with appropriate levels of care as well as systems that could be more secure. There is, thus, much work to be done in the embedded systems design community to achieve a safer and more secure world. Fortunately, a lot of what needs to be done is well understood and easy to implement; what appears to be lacking is motivation.”

I couldn’t agree more. Embedded system designers are under extreme pressure to commercialize connected IoT devices rapidly to keep pace with the tremendous growth of the market. However, we know firsthand from speaking with our customers that security is not always a priority in the development phase.  In fact, not many embedded designers are experienced in the nuances of code encryption, integrity protection, and other critical software security mechanisms required to protect Internet-connected devices. It is not reasonable to expect that a very good embedded system developer is also a very good software security expert. The two disciplines don’t necessarily go hand in hand.

The recent cyberattacks on IoT devices, such as CCTV video cameras and digital video recorders, have served to heighten awareness of the vulnerabilities and public safety issues that can be caused by insecure IoT devices. The security threats are just as great in the IIoT, where critical infrastructure can be compromised. But, as the Barr Group’s survey suggests, increased awareness has not necessarily motivated the embedded developer community to consider the available state-of-the-art security mechanisms that currently exist and collaborate with security experts who know how to implement them.

Under the cloud of increasing cybersecurity threats, it is clear that a security by design approach is a necessity for any embedded system development project, whether it be for an IoT device or an Industrial IoT controller or system. The bottom line is that consumer safety is paramount.

There are several great motivational resources available for download today that will help put IoT and IIoT security into perspective: Trusted Computing Group’s Architect’s Guide: IoT Security white paper,  Wibu-Systems’ Licensing and Security for the IoT white paper, and the Industrial Internet Consortium’s Industrial Internet Security Framework Technical Report. All are free to download.

Inicie sesión o regístrese ahora y disfrute de todas las ventajas de una comunidad.

Para obtener toda la funcionalidad del Foro de IndustryArena es necesario iniciar sesión o registrarse. Este proceso es absolutamente gratuito.

Password forgotten?
Solicitud de contacto
Guest Photo
Your message
The controller within the meaning of Art. 4(7) GDPR is: IndustryArena GmbH, Schneiderstr. 6, 40764 Langenfeld, Germany.
You may reach our data protection officer under dataprotection@industryarena.com.

Purpose of processing
We process your personal data concerning the use of the contact form and the communication with the company of the newsroom as well as the transmission of your data to this company in accordance to Art. 6 (1a) GDPR. This constitutes a legitimate interest for us in accordance to Art. 6 (1f) GDPR.

Recipient of the data
Within our organization, those units gain access to your data, which are necessary to fulfil the above purposes.
Personal data will only be transmitted to third parties if this is necessary for the aforementioned purposes or if another legal basis exists. If necessary, we conclude the corresponding data protection agreements with third parties, in particular pursuant to Art. 28 GDPR.

Data storing
Your data will be transmitted to the company of the newsroom for further processing. The period of storing is the duration of the processing of your request by the respective company.

Seleccionar persona de contacto

Newsroom Logo

Opciones de diseño

  • Título Color de fuente:
  • Contenido Color de fondo:
  • Contenido Color de fuente:
  • Navegación Fondo:
  • Ficha Color de fuente:
  • Pestaña activa Color de fuente:
  • Enlace Color de fuente:
  • Enlace activo Color de fuente:
  • Imagen de fondo Color de fondo

    ¿Cómo quieres colocar la imagen de fondo?

    Tenga en cuenta: Los banners y los rascacielos sólo se guardan para el idioma actual. Para otros idiomas, cambia el idioma con el botón de la parte superior derecha.

    Establecer el enlace para la imagen de fondo

  • Gráfico de cabecera

    ¿Cómo desea alinear el banner?

    Tenga en cuenta: Los banners y los rascacielos sólo se guardan para el idioma actual. Para otros idiomas, cambia el idioma con el botón de la parte superior derecha.

    Introduzca el destino del enlace para el banner

  • Skyscraper

    Introduzca el destino del enlace para el Skyscraper

Tenga en cuenta:

Los banners y los rascacielos sólo se guardan para el idioma actual. Para otros idiomas, cambia el idioma con el botón de la parte superior derecha.