-
Book Overview & Buying
-
Table Of Contents
The Embedded Linux Security Handbook
By :
The Embedded Linux Security Handbook
By:
Overview of this book
As embedded Linux systems power countless devices in our daily lives, they’ve become prime targets for cyberattacks. In this in-depth guide to safeguarding your Linux devices, the author leverages his 30+ years of technology experience to help you mitigate the risks associated with hardware and software vulnerabilities.
This book introduces you to the world of embedded systems, the brains behind your everyday appliances. It takes you through the different types of embedded systems, their uses, and the platforms they run on, while addressing their unique security challenges and support considerations. You’ll learn how to build a successful, secure, and user-friendly solution by exploring the critical hardware and software components that form the foundation of a secure appliance. We won't forget the human element either; you'll find out how to configure your system to prevent user errors and maintain its integrity. The book lets you put your newfound knowledge into action, guiding you through designing a robust build chain that supports the entire life cycle of your appliance solution, enabling seamless updates without your direct involvement.
By the end of this book, you’ll be able to adapt your appliance to the ever-evolving threat landscape, ensuring its continued security and functionality in real-world conditions.
Table of Contents (20 chapters)
Preface
Part 1:Introduction to Embedded Systems and Secure Design
Chapter 1: Welcome to the Cyber Security Landscape
Chapter 2: Security Starts at the Design Table
Chapter 3: Applying Design Requirements Criteria – Hardware Selection
Chapter 4: Applying Design Requirements Criteria – the Operating System
Part 2: Design Components
Chapter 5: Basic Needs in My Build Chain
Chapter 6: Disk Encryption
Chapter 7: The Trusted Platform Module
Chapter 8: Boot, BIOS, and Firmware Security
Chapter 9: Image-Based Deployments
Chapter 10: Childproofing the Solution: Protection from the End-User and Their Environment
Part 3: The Build Chain, Appliance Lifecycle, and Continuous Improvement
Chapter 11: Knowing the Threat Landscape – Staying Informed
Chapter 12: Are My Devices’ Communications and Interactions Secure?
Chapter 13: Applying Government Security Standards – System Hardening
Chapter 14: Customer and Community Feedback Loops
Index