Security+ SY0-601 Notes and Resources

Documentation for Sec+ SY0-601 learning materials and notes.

Back to Home | Back to Domain Two

Subdomain 2.6

Explain the security implications of embedded and specialized systems.

Terms: 45


Embedded Systems

A computer system with a dedicated function within a larger electrical or mechanical system such as traffic lights, smart watch, or medical systems.

Raspberry Pi
Field-programmable Gate Array (FPGA)

Supervisory Control and Data Acquisition (SCADA)/Industrial Control System (ICS)

Facilities
Industrial
Manufacturing
Energy
Logistics
Internet of Things (IoT)
Sensors
Smart Devices
Wearables
Facility Automation
Weak Defaults

Specialized

Medical Systems
Vehicles
Aircraft
Smart Meters

Voice over IP (VoIP)

Heating, Ventilation, Air Conditioning (HVAC)

Drones

Multifunction Printer (MFP)

Real-Time Operating System (RTOS)

Surveillance Systems

System on a Chip (SoC)

Communication Considerations

Are crucial to ensure confidentiality, integrity, and availability of data. Embedded systems can use many different methods for communication, such as 5G, narrowband, baseband, and Zigbee networks.

5G
Narrow-Band
Baseband Radio
Subscriber Identity Module (SIM) Cards
Zigbee

Constraints

Embedded systems have several constraints that limit their functionality and security. Constraints include power, networking, upgradeability, patching, and cost to name a few.

Power
Compute
Network
Crypto
Inability to Patch
Authentication
Range
Cost
Implied Trust

Demonstrate Your Understanding

Back to Top | Study in a New Tab

Click or tap on ‘Choose a Study Mode’ to switch between flash cards, match, learn, test and more.