Latest from Embedded

ID 217230663 © Christian Offenberg - Dreamstime.com | electronica.de
promo_messe_munich__id_217230663__christian_offenb
ID 312689142 © Chechotkin | Dreamstime.com
LiDAR in autonomous driving
ID 333722484 © Weddingodessa85 | Dreamstime.com | AI generated.jpg
Translucent car showing electronics | AI generated
Dreamstime_cookiecutter_100807069
Security risks with DRAM
ID 326211957 © Kwangmoo | Dreamstime.com
Security IP CCTV camera using solar energy
Chapter6 6391fdf074bea

Time to Think About the How and Where of Cryptography (Download)

Dec. 8, 2022
Download the PDF of the sixth chapter of “The Cryptography Handbook.” It reviews the types of threats crypto systems face, demonstrates how to plan for threats, and presents what types of countermeasures are available.

Check out the other chapters in the Communication Series:  The Cryptography Handbook

Threats from various sources relentlessly attack all our connected systems. Connected systems don’t necessarily mean those connected to the internet. It could also include a pulse oximeter connected to a patient in a hospital environment or a printer cartridge connected to a printer. The current plethora of Internet of Things (IoT) devices like thermostats and refrigerators are also susceptible to hacking. Let’s look at a few of these threats and learn how to protect your devices and see what kind of planning you need to do.

Comments

To join the conversation, and become an exclusive member of Electronic Design, create an account today!