Search engine :
Return to the menu
Vote:
Results:
0 Votes
JANUARY-DECEMBER 2016 - Volume: 3 - Pages: [12 p.]
Download pdf
Nowdays almost all electronic devices we use have integrated some embedded system designed for a specific purpose, which facilitate our quality of life enormously and we can added the posibility to connect via the Internet to access remotely the information. This means that our devices are more vulnerable to possible attacks and we must protect ourselves as much as possible.In this paper we see the historical development of embedded systms, their use and their current situtation. We show a practical case of scanning and detection of potential vulnerabilities of a real-time operating system that can be installed in embedded systems and a variety of rules to follow to protect them both physically and in terms of software.
Share:
© DYNA New Technologies Journal
EDITORIAL: Publicaciones DYNA SL
Adress: Alameda Mazarredo 69 - 2º, 48009-Bilbao SPAIN
Email: info@dyna-newtech.com - Web: http://www.dyna-newtech.com
Regístrese en un paso con su email y podrá personalizar sus preferencias mediante su perfil
Name: *
Surname 1: *
Surname 2:
Email: *