- 1、本文档共9页,可阅读全部内容。
- 2、有哪些信誉好的足球投注网站(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
克服安全问题的嵌入式系统 外文翻译
附录A
Overcome security issues in embedded systems
By Gary Drossel
Embedded Systems Design
(06/12/07, 12:15:00 H EDT)
Traditional security techniques may not suffice anymore. Embedded systems are getting more complex and hackers are getting smarter.
Embedded systems traditionally have had very limited security options. Indeed, fitting a robust set of security features into such a small mechanical footprint can be challenging. Storage components, processing power, battery life, time-to-market, and overall cost concerns have prevented most security features from being implemented. Overcoming these design challenges has become crucial to embedded systems designers in light of the growing threat of security breaches as more systems are shared or attached to networks and new regulations are adopted that make security mandatory.
The security industry has focused largely on portable storage devices for the consumer electronics industry. The basic premise here is that users want security capabilities to travel with the device, such as with a USB thumb drive. This approach lets users protect their data on any system, whether its on an office or home PC, an Internet kiosk, or a public computer. Software applications and data are password-protected using industry-defined security protocols, which often are targeted by Internet hackers. Portable data devices are also highly susceptible to theft. Once stolen and the security encryption defeated, the fully intact data can be accessed, loaded onto a PC or the Internet, sold, or worse.
On the other hand, embedded systems applications for the enterprise OEM market face their own unique challenges. These OEMs (original equipment manufacturers) targeting the netcom, military, industrial, interactive kiosk, and medical markets typically provide infrastructure equipment to their customers by supplying everything from network routers and voting machines to medical diagnostic equipment and data recorders. The key requirement is that data mu
您可能关注的文档
最近下载
- 中级会计师-中级会计实务-突击强化题-第12章收入.docx VIP
- 二级医院超声质量控制指南.pdf VIP
- 中级会计师-中级会计实务-突击强化题-第15章债务重组.docx VIP
- 2025【手写字体的识别问题研究国内外文献综述2700字】.docx VIP
- 2024中级会计考试中级会计实务课件讲义——第五章长期股权投资和合营安排.pdf VIP
- 2025年人教版(2024)二年级数学下册月考试卷.docx
- 中级会计师-中级会计实务-突击强化题-第05章长期股权投资和合营安排.docx VIP
- 《京东供应链管理》课件.ppt VIP
- 律师事务所(普通合伙)章程.docx
- 2025届广东省广州市高三下学期一模考试语文试题及答案.docx
文档评论(0)