Understanding security threats to embedded systems and IoT devices
00:21:28
|
27 DEC 2019
This video summarizes why hackers might attack an embedded device followed by a short overview of remote and physical attack methods. It then discusses four actual attacks on embedded systems, such as point of sales terminals and smart meters, detailing the weaknesses that the attack exploited to gain control or access to the system.
Resources
-
arrow-right To get hands-on experience with software examples, go to the SimpleLink Academy training and select ‘CC32xx training’ followed by ‘Wi-Fi’. -
arrow-right Download the SimpleLink SDK used in the SimpleLink Academy examples -
arrow-right Download the CCS IDE to build the examples -
arrow-right Get the SimpleLink Wi-Fi CC3235SF LaunchPad kit to run the examples