Issue link: https://resources.mouser.com/i/1506851
Introduction A defining aspect of modern technology is the proliferation and availability of data. This trend is largely due to recent advancements in sensing technology and embedded computing, which work together to bestow intelligence to otherwise ordinary devices. Because of these advancements, almost any device you interact with today can measure and share information about itself and the environment. In the context of embedded systems, data availability is creating more powerful edge devices and driving the need for embedded security. An embedded system is one in which a computer is an integral part of the system. Today's embedded systems generally consist of an integrated microcontroller unit (MCU) and analog sensing and wireless communication hardware. Together, these components measure, interpret, and communicate information to and from a network of devices. Today's embedded devices are expected to measure, store, and communicate data and upgrade firmware securely, but each of these functions represents a point of vulnerability in the system. In embedded systems, security can boil down to preventing malicious access to and use of systems and securing proprietary device data. These objectives are particularly important for safety-critical devices, whose proper operation is essential for user safety. Analog Devices, Inc. is an industry leader in embedded security, boasting a long history in the field and offering customers a broad portfolio of solutions. In this eBook, we take a deeper look at embedded security concepts and their importance, and how Analog Devices helps customers ensure the highest level of security in their embedded devices. Mighty Guides make you stronger. Credible advice from top experts helps you make strong decisions. Strong decisions make you mighty. Reading a Mighty Guide is kind of like having your own team of experts. These authoritative and diverse guides provide a full view of a topic. They help you explore, compare, and contrast a variety of viewpoints so that you can determine what will work best for you. 4 Embedded Security: Keeping Edge Data Safe