Are My Devices’ Communications and Interactions Secure?
It can be said that the only really secure computer is one that is powered off and locked away in a vault. There’s no fun nor usability in that so we must determine appropriate measures to limit exposure to vulnerabilities while still having the system be usable for the mission it was intended for.
In this chapter, you will learn how to determine the use cases and limitations of commonly used external buses for hardware communication. We’ll review network security with firewalls. We’ll work through some hands-on exercises in locking down your web-based services with SSL certificates. We will dive into the gotchas of legacy hardware and software and close out this chapter with the security validation of your appliance.
“Why is this important to my project?” you may ask... Simply put, you might lock down the system itself incredibly well, however, that system’s connections to...