2 cissp ® Official Study Guide Eighth Edition


Methods of Securing Embedded and Static Systems



Download 19,3 Mb.
Pdf ko'rish
bet357/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   353   354   355   356   357   358   359   360   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Methods of Securing Embedded and Static Systems
Security concerns regarding embedded and static systems include the fact that most are 
designed with a focus on minimizing costs and extraneous features. This often leads to a 
lack of security and difficulty with upgrades or patches. Because an embedded system is in 


378
Chapter 9 

Security Vulnerabilities, Threats, and Countermeasures
control of a mechanism in the physical world, a security breach could cause harm to people 
and property.
Static environments, embedded systems, and other limited or single-purpose comput-
ing environments need security management. Although they may not have as broad an 
attack surface and aren’t exposed to as many risks as a general-purpose computer, they still 
require proper security government.
Network Segmentation
Network segmentation
involves controlling traffic among networked devices. Complete or 
physical network segmentation occurs when a network is isolated from all outside com-
munications, so transactions can only occur between devices within the segmented net-
work. You can impose logical network segmentation with switches using virtual local area 
networks (VLANs), or through other traffic-control means, including MAC addresses, IP 
addresses, physical ports, TCP or UDP ports, protocols, or application filtering, routing, 
and access control management. Network segmentation can be used to isolate static envi-
ronments in order to prevent changes and/or exploits from reaching them.
Security Layers
Security layers
exist where devices with different levels of classification or sensitivity are 
grouped together and isolated from other groups with different levels. This isolation can be 
absolute or one-directional. For example, a lower level may not be able to initiate commu-
nication with a higher level, but a higher level may initiate with a lower level. Isolation can 
also be logical or physical. Logical isolation requires the use of classification labels on data 
and packets, which must be respected and enforced by network management, OSs, and 
applications. Physical isolation requires implementing network segmentation or air gaps 
between networks of different security levels.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   353   354   355   356   357   358   359   360   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish