Supplier eBooks

Renesas - Secure Your connected World

Issue link: https://resources.mouser.com/i/1437738

Contents of this Issue

Navigation

Page 7 of 27

Why Protect Local Stored Data? There are two different kinds of local stored data: the application program, which will be executed while operating, and the local data, which is used during operation. The application program includes the knowledge or IP of the manufacturer, and therefore the device manufacturer protects its knowledge from being stolen, reused, or copied. Data is normally stored on a device. Data can be transferred and updated on a separate, identical device since all devices have the same attributes. The local data is stored during setup of the device in the final environment, or during operation of the device. All devices have different data inside and the updates are usually more frequent than the application code. The motivation to protect this data is more from the user of the device, as the data might include sensitive information for their environment. Even though the motivation of securing the data is rather different, the demand to protect the data to be accessed externally is mandatory for both types of data. Is Your Device Connected? This is a very important question for the amount of security implementation. For a device running standalone without any connection, possible attacks can be reduced to ones that have direct physical access. This is still an issue for the manufacturer to protect the IP inside the device, but for the user data, this is much more unlikely as an attacker usually doesn't have physical access to the device. The next level of connection is a device operating in a local closed network without any connection to the Internet. Here an Securing your IP and Protecting Sensitive Data By Markus Vomfelde, Sr. Manager, IoT and Infrastructure Business Unit, Renesas Electronics Corp. Brad Rex, Sr. Product Marketing Manager, IoT and Infrastructure Business Unit, Renesas Electronics Corp. Zachary Ellis, Sr. Marketing Specialist, IoT and Infrastructure Business Unit, Renesas Electronics Corp. In the first white paper of this series, Renesas gave an overview about security for the connected world. This white paper will give more details about the demand and the techniques–why and how–to protect stored data in the MCU or application. Based on an artificial example, it will guide you through the consideration of different levels of security implementation based on the demand from the application and potential attack scenarios. This should help you to prepare a security plan for data stored in the device and find the best security level based on your demand. | 8 |

Articles in this issue

view archives of Supplier eBooks - Renesas - Secure Your connected World