Cover Image
市場調查報告書

關注的內建式安全趨勢

2013-14 Embedded Security Trends to Watch

出版商 VDC Research Group, Inc. 商品編碼 322876
出版日期 內容資訊 英文 14 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
關注的內建式安全趨勢 2013-14 Embedded Security Trends to Watch
出版日期: 2014年01月24日 內容資訊: 英文 14 Pages
簡介

本報告依據對OEM企業的工程師的調查結果、提供內建式設備安全趨勢相關調查分析、不久的將來、日益影響內建式設備安全的趨勢等彙整資料,為您概述為以下內容。

來簡介:中心的安全

趨勢#1:連接

  • 生產圖表1:連網型設備的內建式工程企業

趨勢#2:認證、加密

  • 圖表2:在下一代設備上加上巨大價值的「設備保護」功能
  • 圖表3:在下一代設備上加上巨大價值的「設備的資料保護」功能
  • 圖表4:在下一代設備上加上巨大價值的「設備上的資料保護」功能

趨勢#3:安全對設備成本的影響

  • 圖表5:分配給安全的NRE成本的比例
  • 圖表6:分配給安全的BOM成本的比例

趨勢#4:Android

  • 圖表7:使用內建式Android的OEM工程企業的比例

結論

目錄

Introduction: Security Coming to the Forefront

For decades, embedded devices have spanned a broad range of vertical markets and applications, from consumer products to military hardware. Historically, securing embedded devices was relatively straightforward, as the devices were limited in scope, and the potential ways to access them were few. In most cases, security was either an afterthought or a minor component of product development and engineering.

As embedded devices have grown in recent years in their quantity, complexity, and ubiquity in everyday life, security threats to them have grown as well, such that one security breach can now have society-wide repercussions. The breach of point-of-sale credit and debit card data disclosed by US retailing giant Target in December 2013 affected up to 110 million customers - nearly half of all the adults in the US.

Every time a major data breach is announced, the public becomes more sensitized to security of their own devices and those of the businesses with whom they deal. Pressure is increasing on OEMs to design their devices and systems to further enhance security. Although 100 percent protection can never be assured, OEMs and their clients must now consider security an essential element of their embedded products.

Embedded device security has many facets to it, including the following:

  • Hypervisors and/or virtualization to separate secure and unsecure operating systems on the same device
  • Sandboxing of applications to prevent errors or infections in one application from impacting others
  • Best practices for secure coding to minimize potential unauthorized entry points or vulnerabilities to induced crashes
  • Safeguarding of the firmware image and bootloading process
  • Penetration prevention and detection
  • Human user authentication
  • Remote machine authentication
  • Encryption of stored data
  • Encryption of data during communications

To help assess ongoing trends in embedded device security, VDC conducted a survey in December 2013 of engineers at OEM organizations. In this document, we highlight some of the findings from that survey to discuss relevant trends that will increasingly impact embedded device security in the coming years. Full results of the survey are available in an accompanying Excel spreadsheet file.

Conclusion

With security concerns becoming ever more prevalent in embedded devices, engineering organizations are realizing that security is an integral feature of nearly any connected product.

Two of the trends we've discussed in this document-connectivity and Android-increase security threats to embedded devices. Authentication and encryption will help reduce some of those threats, but no matter how much technology embedded engineers devote to security, the arms race against hackers will impact OEM costs and development times.

Even after embedded products are deployed, hackers might devise new attack methods, requiring OEMs to revise embedded firmware or security-related services. By staying abreast of the latest developments and commercial solutions, OEMs can maintain vigilance in the face of security threats.

Table of Contents

Introduction: Security Coming to the Forefront

Trend #1: Connectivity

  • Exhibit 1: Embedded engineering organizations that produce connected devices

Trend #2: Authentication and Encryption

  • Exhibit 2: “Protection of device” features that would add significant value in next-gen devices
  • Exhibit 3: “Protection of data to/from device” features that would add significant value in next-generation devices
  • Exhibit 4: "Protection of data on device" features that would add significant value in next-generation devices

Trend #3: Security Impact on Device Costs

  • Exhibit 5: Percent of non-recurring engineering (NRE) costs allocated to security
  • Exhibit 6: Percent of bill-of-materials (BOM) costs allocated to security

Trend #4: Android

  • Exhibit 7: Percent of OEM engineering organizations using embedded Android

Conclusion

Back to Top