After completing this video, the learner will understand how to create a computing environment that facilitates the secure use of embedded devices using controls that include network segmentation, application firewalls and layered defenses.
- [Voiceover] One way that you can ensure…controlled diversity and redundancy for embedded systems…is placing them within a secure network environment…that is designed to protect smart devices from attack…and protect other systems on the network…from compromised smart devices.…The tried and true way to protect suspect systems…is the use of a control known as Network Segmentation.…Network segmentation simply places untrusted devices…on a network of their own…where they have no access to trusted systems.…In the context of embedded devices…network segmentation might look something like this.…
We have our standard corporate wired and wireless networks…that have laptops, desktops, and servers connected to them…and then a separate network hanging off the Firewall…that contains embedded devices used to control…an industrial process.…Does this look similar to anything you've already seen…in your study of information security?…If it looks like a Firewall DMZ…there's a good reason for that, it's the same concept.…Placing embedded systems in an isolated DMZ…
We are now a CompTIA Content Publishing Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
- SQL injection prevention
- Cross-site scripting (XSS) prevention
- Fuzz testing
- Mobile device management (MDM)
- Mobile device tracking
- Operating system security
- Hardware security
- Virtualization security
- File permissions
- Data encryption
- Securing smart devices