2013-14 Embedded Security Trends to Watch
|出版商||VDC Research Group, Inc.||商品編碼||322876|
|出版日期||內容資訊||英文 14 Pages
For decades, embedded devices have spanned a broad range of vertical markets and applications, from consumer products to military hardware. Historically, securing embedded devices was relatively straightforward, as the devices were limited in scope, and the potential ways to access them were few. In most cases, security was either an afterthought or a minor component of product development and engineering.
As embedded devices have grown in recent years in their quantity, complexity, and ubiquity in everyday life, security threats to them have grown as well, such that one security breach can now have society-wide repercussions. The breach of point-of-sale credit and debit card data disclosed by US retailing giant Target in December 2013 affected up to 110 million customers - nearly half of all the adults in the US.
Every time a major data breach is announced, the public becomes more sensitized to security of their own devices and those of the businesses with whom they deal. Pressure is increasing on OEMs to design their devices and systems to further enhance security. Although 100 percent protection can never be assured, OEMs and their clients must now consider security an essential element of their embedded products.
Embedded device security has many facets to it, including the following:
To help assess ongoing trends in embedded device security, VDC conducted a survey in December 2013 of engineers at OEM organizations. In this document, we highlight some of the findings from that survey to discuss relevant trends that will increasingly impact embedded device security in the coming years. Full results of the survey are available in an accompanying Excel spreadsheet file.
With security concerns becoming ever more prevalent in embedded devices, engineering organizations are realizing that security is an integral feature of nearly any connected product.
Two of the trends we've discussed in this document-connectivity and Android-increase security threats to embedded devices. Authentication and encryption will help reduce some of those threats, but no matter how much technology embedded engineers devote to security, the arms race against hackers will impact OEM costs and development times.
Even after embedded products are deployed, hackers might devise new attack methods, requiring OEMs to revise embedded firmware or security-related services. By staying abreast of the latest developments and commercial solutions, OEMs can maintain vigilance in the face of security threats.