This resource is no longer available

3 Must-Follow Guidelines for Mitigating M2M Software Security Risks

Cover

Embedded systems are omnipresent, residing in everything from dishwashers to automobiles to medical devices. As they have evolved and become interconnected, the security risks to those systems have increased substantially.

Whether from malicious hacking attempts, faulty code or the physical presence of an adversary, manufacturers of products that allow for Machine-to-Machine (M2M) communications must ensure the safety and security of these devices.

This paper outlines three important guidelines that embedded software teams should follow to help protect critical M2M systems against failure and malicious attack:

  1. Address security early and take defensive measures against security threats using threat modeling
  2. Build security in at the development stage by finding and fixing code vulnerabilities with static analysis and code review
  3. Protect systems from unauthorized changes and malware with application whitelisting
Vendor:
Klocwork
Posted:
04 Dec 2013
Published:
04 Dec 2013
Format:
PDF
Length:
6 Page(s)
Type:
White Paper
Language:
English

This resource is no longer available.