Part 1:Introduction to Embedded Systems and Secure Design
In this part, we will introduce you to the threats that impact your decision processes, hardware selection, operating system selection, and all the strengths and vulnerabilities that may alter your design criteria.
This part has the following chapters:
- Chapter 1, Welcome to the Cyber Security Landscape
- Chapter 2, Security Starts at the Design Table
- Chapter 3, Applying Design Requirements Criteria – Hardware Selection
- Chapter 4, Applying Design Requirements Criteria – the Operating System