Cyber Security Applied to Embedded Systems - PowerPoint PPT Presentation

About This Presentation
Title:

Cyber Security Applied to Embedded Systems

Description:

Cyber Security Applied to Embedded Systems – PowerPoint PPT presentation

Number of Views:539
Slides: 24
Provided by: wesley.comal
Tags:

less

Transcript and Presenter's Notes

Title: Cyber Security Applied to Embedded Systems


1
(No Transcript)
2
(No Transcript)
3
(No Transcript)
4
(No Transcript)
5
This course will likewise train understudies how
to examine, turn around, investigate, and abuse
embedded RTOS firmware. Hands-on involvement with
an assortment of true gadgets, RTOS's, and
designs furnish understudies with the down to
earth information and aptitudes important to be
capable in RTOS defenselessness examination and
misuse. We will examine chance evaluation
philosophies, disappointment examination and
utilizing protective tools to moderate cyber
hazard and vulnerabilities. To guarantee
effective mission control framework execution,
embedded systems, for example, weapon systems,
rockets, shrewd weapons, Network Enabled Weapons
(NEW), UAVs, correspondences systems, mechanical
control systems, medicinal gadgets, apply
autonomy, brilliant matrix, SCADA, Intelligent
Electronic Devices (IED), PLCs, and autonomous
autos must be anchored to play out their planned
capacities, forestall cybeattacks, and work with
no cyberattack affect. Cyber Security Applied
to Embedded Systems acquaints cybersecurity ideas
applied with embedded systems, firmware,
equipment and embedded programming. This course
is intended for anybody keen on cybersecurity,
investigation, abusing, and fixing
vulnerabilities with true embedded systems.
Cyber Security Applied to Embedded Systems
TAKE THIS COURSE
https//www.tonex.com/training-courses/cyber-secur
ity-applied-embedded-systems/
6
Cyber Security Applied to Embedded Systems
TAKE THIS COURSE
https//www.tonex.com/training-courses/cyber-secur
ity-applied-embedded-systems/
7
  • Takeaways from this course include
  • Examining how to cybersecurity fit in
    the embedded systems
  • Fundamentals of Cybersecurity
  • Fundamentals of Embedded Systems
  • Fundamentals of embedded system product design
    cycle, project management, design for production,
    VV and OM
  • Embedded Systems Security Requirements
  • Fundamentals of hardware and firmware analysis
    and design in embedded design
  • Vulnerabilities in embedded systems
  • Embedded hardware and firmware analysis to detect
    vulnerabilities
  • Foundation  knowledge of cyber security threats,
    risks, mitigation strategies applied to embedded
    systems
  • Exploitable vulnerabilities in embedded systems
    and techniques and strategies for systems
    engineering embedded systems
  • Communication protocols, wired and wireless
    networks, information and network attacks and
    their impact on embedded devices
  • Risk assessment techniques and methodologies and
    using defensive tools for mitigating risk and
    vulnerabilities

Cyber Security Applied to Embedded Systems
TAKE THIS COURSE
https//www.tonex.com/training-courses/cyber-secur
ity-applied-embedded-systems/
8
Cyber Security Applied to Embedded Systems
TAKE THIS COURSE
https//www.tonex.com/training-courses/cyber-secur
ity-applied-embedded-systems/
9
  • Course Topics
  • Cybersecurity 101
  • Introduction to Embedded Systems
  • Embedded System Vulnerability Analysis
  • Exploiting Real Time Operating Systems
  • Securing Embedded Systems Interfaces and
    Protocols
  • Cybersecurity Attacks and Best Mitigation
    Practices for Embedded Systems
  • Case Study and Workshop

Cyber Security Applied to Embedded Systems
TAKE THIS COURSE
https//www.tonex.com/training-courses/cyber-secur
ity-applied-embedded-systems/
10
Cyber Security Applied to Embedded Systems
TAKE THIS COURSE
https//www.tonex.com/training-courses/cyber-secur
ity-applied-embedded-systems/
11
  • Cybersecurity 101
  • What is Cybersecurity?
  • Basic principles of CIA
  • Confidentiality
  • Embedded systems critical information
  • Application code and surveillance data
  • Unauthorized entities and Integrity
  • Availability and mission objectives
  • Cyber Risks applied to Embedded Systems
  • Principles and practices designed to safeguard
    your embedded system
  • Hacking tools and entry points
  • Encryption and authentication, Data Integrity
  • Vulnerability analysis 101 and Mitigation 101
  • Networking and network attacks
  • Role of wireless networks in the embedded systems
  • Embedded hardware and firmware analysis and
    reverse engineering
  • Embedded system security Threats
  • Intrusion and Virus, Worm, Trojan Horse (Malware)

Cyber Security Applied to Embedded Systems
TAKE THIS COURSE
https//www.tonex.com/training-courses/cyber-secur
ity-applied-embedded-systems/
12
  • Introduction to Embedded Systems
  • Embedded Systems 101
  • Hardware Architecture
  • Software Development
  • Microprocessor Primer
  • Basic architecture
  • Programmers view
  • Embedded Operating Systems
  • Case Study Embedded mmWave Radar System
  • Embedded Systems Engineering

Cyber Security Applied to Embedded Systems
TAKE THIS COURSE
https//www.tonex.com/training-courses/cyber-secur
ity-applied-embedded-systems/
13
  • Embedded System Vulnerability Analysis
  • Networking and network attacks
  • Wireless networks and embedded systems
  • Embedded hardware and firmware analysis
  • Exploiting Embedded Devices
  • The stages of router exploitation
  • Initial Reconnaissance and Exploitation
  • Firmware Unpacking and Modification
  • Detecting, Extracting and Analysis
  • Cross Compiling
  • Modification and Creation of new firmware
  • Persistent Dynamic Backdoor
  • Firmware analysis and extraction
  • Finding and exploiting logic flaws
  • Firmware emulation and debugging
  • Finding and exploiting real-world overflows
  • Foundations of cyber security and emerging
    threats
  • Hacking/exploitation techniques, tools and entry
    points

Cyber Security Applied to Embedded Systems
TAKE THIS COURSE
https//www.tonex.com/training-courses/cyber-secur
ity-applied-embedded-systems/
14
Cyber Security Applied to Embedded Systems
TAKE THIS COURSE
https//www.tonex.com/training-courses/cyber-secur
ity-applied-embedded-systems/
15
  • Exploiting Real Time Operating Systems
  • Basic introduction to the concept of Real Time
    Operating Systems
  • Overview of MIPS architecture and design
  • Firmware analysis of our first target device
  • Debugging our first target device
  • Augmenting IDAs auto analysis
  • Searching for backdoors
  • How not to crash your target
  • Hardware firmware analysis
  • Identifying functions without a symbol table
  • Low-hanging crypto
  • Breaking custom crypto
  • Practical exploitation of crypto bugs
  • More firmware analysis
  • Augmenting IDAs auto analysis
  • Chip backdoors and Hidden manufacturer menus
  • Hardware Hacking, Basic electronics and circuit
    analysis
  • Analog/digital communications

Cyber Security Applied to Embedded Systems
TAKE THIS COURSE
https//www.tonex.com/training-courses/cyber-secur
ity-applied-embedded-systems/
16
  • Securing Embedded Systems Interfaces and
    Protocols
  • Embedded Systems Communication Protocols
  • Universal Asynchronous Receiver/Transmitter
    (UART)
  • Serial Peripheral Interface (SPI)
  • Joint Test Action Group (JTAG)
  • Inter-integrated Circuit (I2C)
  • I2C bus, CAN bus and FireWire bus
  • USB and Parallel protocols
  • PCI bus and ARM bus
  • Wireless protocols
  • IrDA
  • Bluetooth and Bluetooth LE (BLE)
  • IEEE 802.11
  • NFC and RFID
  • 802.15.4
  • 6LowPAN and Thread
  • Zigbee
  • Z-Wave

Cyber Security Applied to Embedded Systems
TAKE THIS COURSE
https//www.tonex.com/training-courses/cyber-secur
ity-applied-embedded-systems/
17
Cyber Security Applied to Embedded Systems
TAKE THIS COURSE
https//www.tonex.com/training-courses/cyber-secur
ity-applied-embedded-systems/
18
  • Cybersecurity Attacks and Best Mitigation
    Practices for Embedded Systems
  • Non-Invasive Hardware Reverse Engineering
  • Component identification
  • Tracking PCB traces
  • Re-producing schematic and block diagrams
  • Bus Sniffing
  • Interface Analysis
  • Communications protocols sniffing
  • Decoding and deciphering captured bits
  • Critical data identification and detection
  • Component removal and replacement
  • Dealing with surface mount components
  • Electronics and circuit analysis
  • Understanding your tools and their effects on the
    circuit
  • Understanding the circuit and its effect on your
    tools
  • Security Measures

Cyber Security Applied to Embedded Systems
TAKE THIS COURSE
https//www.tonex.com/training-courses/cyber-secur
ity-applied-embedded-systems/
19
  • Case Study and Workshop
  • Cybersecurity Analysis of Embedded Systems used
    in unmanned aircraft system (UAS)
  • Design Process
  • Embedded system CONOPS
  • Mission objectives
  • CONOPS
  • Test and evaluation
  • Functional requirements
  • Threat analysis and System design
  • Security requirements
  • Performance evaluation
  • Security evaluation
  • System Implementation Security
  • Attack surface, Boot process, system data, and
    software
  • Physical attack surface and Root of trust
    establishment
  • Trust hardware and software components , Trusted
    platform module (TPM)
  • Operating system (OS) and Mission-specific
    application code (Apps)
  • Field-programmable gate array (FPGA)

Cyber Security Applied to Embedded Systems
TAKE THIS COURSE
https//www.tonex.com/training-courses/cyber-secur
ity-applied-embedded-systems/
20
Cyber Security Applied to Embedded Systems
TAKE THIS COURSE
https//www.tonex.com/training-courses/cyber-secur
ity-applied-embedded-systems/
21
(No Transcript)
22
(No Transcript)
23
(No Transcript)
Write a Comment
User Comments (0)
About PowerShow.com