preview

General Purpose Computing And Communications Systems

Better Essays

Preface:
Lately, hardware security has been the subject of intensive research in the context of general-purpose computing and communications systems. However, security is often misunderstood by embedded system designers to be an add-on luxury that can otherwise be done away with in order to improve efficiency and certain other aspects of their product designs such as the cost, performance, power consumption and similar metrics. In reality, security needs to be incorporated as a new dimension by the system designers and it needs to be a primary objective of such design considerations right from the initial stages of the product lifecycle due to its high relevance and intrinsic value in subsequent stages of its operation. The challenges …show more content…

The final challenge is the "assurance gap," which relates to the gap between functional security measures (which include security services, protocols and their constituent cryptographic algorithms) and actual secure implementations.
An example of a field where embedded systems find use is in the world of e-commerce. Non-cash payments (cards, checks, ACH, electronic transactions etc.) for the year 2012 is listed at $122.8 billion in the United States alone and, the number of such transactions has seen an increase in annual rate of 4.4 percent (2009-2012) and at a rate of 4.7 percent between 2003 and 2012 based on the Federal Reserve Payment Study [1]. In this same report, it is noted that there were 31.1 million unauthorized transactions (third-party fraud) which amounted to an estimated $6.1 billion in monetary value. These figures provide an estimate as to the extent of damage possible today in the world of commerce. There are real livelihoods at stake and providing Network Security in the context of online transactions can address some the vulnerabilities seen in the system. Recent attacks that have targeted various financial and commercial institutions in the United States alone, point to the urgent need to implement security solutions universally across all platforms that use embedded systems. This has to be implemented in a systematic manner and should include the active

Get Access