specialised systems within a broader system, designed to serve a specific function
in regards to hardening techniques, embedded systems must first be assessed:
- gather documentation about it
- what does the embedded system interface with
- if there is network connectivity, identify services and access
- assess patching
- document what happens if the system is compromised
supervisory control and data acquisition SCADA, industrial control systems ICS
Internet of things IoT hardening techniques include:
- using the highest level of wireless security available
- secure the subscriber identity module SIM, prevent:
- SIM cloning
- other malicious attacks