Cyber Exploitation/Embeded Sys — Embedded systems offer many opportunities to economically and effectively control large infrastructure systems, small single purpose devices, and many products in between. But their use can also introduce vulnerabilities easily exploited to gain access to valuable data, alter device functionality, or impose other risks. Understand those unique vulnerabilities in embedded systems that are commonly exploited. Discover techniques and strategies for designing cyber security measures into products from the start. Through hands-on labs, examine emerging threats and learn to think like a “hacker” to gain the skills necessary to create more secure products. Focus on methodologies for assessing risk, integrating defensive tools for mitigating risk, and addressing future vulnerabilities throughout the product life cycle. Finally, discover best practices to integrate into your design processes to raise your level of product security.
No prereqs
Taught by nobody this semester.