Supplier eBooks

Analog Devices - Embedded Security: Keeping Edge Data Safe

Issue link: https://resources.mouser.com/i/1506851

Contents of this Issue

Navigation

Page 11 of 24

and the patient, as medical data should not be disclosed to the wrong people. Secure communication ensures not only that network endpoints are trustworthy but also that the data are not somehow modified in transit (i.e., data integrity). To guarantee secure communication, devices will often employ secure communication protocols like Transport Layer Security (TLS), which offer a high level of security to connected devices. Secure storage of information is the concept of ensuring that data are stored safely on the device and that only users with the correct security credentials can access stored information. The installation of malware and the introduction of viruses are common attack vectors that must be considered for secure storage of information. Analog Devices helps ensure trusted operations for connected devices by • Offering customers authenticators with the capability to check the digital signature of firmware on small MCUs with limited compute power. • Designing integrated circuits (ICs) that enable easy management and distribution of certificates and credentials. • Offering products that leverage secure communication protocols like TLS. C h a p t e r 2 | Tr u s t e d O p e r a t i o n s f o r C o n n e c t e d P r o d u c t s Trusted operations refer to the security measures and protocols for ensuring the secure and reliable execution of critical operations and functions within an information system or network. Trusted operations are usually implemented in environments that require high levels of security, such as military, government, financial, and healthcare systems." Mohammed Ibrahim Field Application Engineer, Ruptela 12 Embedded Security: Keeping Edge Data Safe

Articles in this issue

Links on this page

view archives of Supplier eBooks - Analog Devices - Embedded Security: Keeping Edge Data Safe