Introduction to embedded Linux security

Introduction to embedded Linux security

Security is a key feature in every connected product. But the real question is: what do you want to secure? Do you want to protect the Intellectual Property? Or maybe the integrity of your product? Do you want to secure data at rest? And what about data in transit? These and other questions can be answered with a proper threat modeling process so potential threats can be identified and mitigated.

In this webinar, an example of threat modeling to identify the security requirements of an embedded Linux system will be discussed, and a wide range of tools and techniques to implement the security requirements will be presented, including secure/verified boot, data integrity and encryption, TPM and key management, secure firmware update and patching, secure coding, sandboxing and containers, TEE, mandatory access control (SELinux, AppArmor, etc), authentication, port scanning, and many more!

Key Takeaways
    • Understand why security is important for your product
    • Learn how threat modeling can help understand the product's security requirements
    • Have an idea of what should be secured in an embedded system and why
    • Learn different tools and techniques to improve the security of an embedded Linux system
    • Have your questions answered by experts from Toradex

Note: The video recording of the webinar will be made available here shortly.

 


Date: May 29, 2020
Language: English
#Embedded Linux

Recommended Webinars