Time
33 hours 23 minutes
Difficulty
Beginner
CEU/CPE
33

Video Transcription

00:00
Hello and welcome to the Sai Buri 2019 comp Tia Security plus certification purpose. Of course,
00:09
we continue our discussion of marginal or three, and the topic discussion will be domain three. Architecture and design
00:17
Surprising enough. We have a brand new London objective, which is 3.5, where we have to explain the security implication of embedded systems.
00:27
With that man said, Let's turn our teacher tore at pre assessment quiz and in fact, this is a true or false statement
00:33
and it reads as follows. A home automation system will controlled lighting, climate, entertainment systems, alarm systems and appliances. Is this true or false?
00:47
In this case, if you selected chew, you're absolutely correct.
00:53
As mentioned earlier, we begin the process of taking a look at a brain to objective, which is 3.5, where we had explained the security implication of embedded systems.
01:00
With that being said, let's take a look at some concept which encompasses this particular objective which will be covered doing this particular video. We begin by first taking a look at supervisory control and data acquisition. Often time. Refer to it skater and your industrial control systems as well.
01:18
Take a look at the smart devices as well as the Internet of things which encompasses wearable technology as well as your home automation,
01:26
heating, ventilation and air conditioning, which is comprises your H fact.
01:32
Then we have our system on the chip often referred to as your S O C
01:38
real time operating systems or other words. The are to US
01:44
printers, multi function devices or M D efs
01:48
and lastly, our camera systems.
01:53
Additionally, some additional objectives or content it would be covered. Doing this particular video,
01:57
we take a look at special purpose of the worst on medical devices,
02:02
vehicles,
02:05
aircraft. What has your unmanned aerial
02:07
vehicles or you waves?
02:12
Perhaps the best place began. This particular video is by first or providing with a brief introduction as to exactly what is an embedded system.
02:20
Did you know that an embedded systems, in fact, a electronic system that has software and is embedded into computer hardware surprised enough? Some are programmable, and some are not.
02:32
Then we have, ah, supervisory control and data acquisition basically refers to an industrial control system,
02:40
or RCs,
02:42
that are implored to controlled and keep track of equipment or a plant in industries like water.
02:49
Where's control, telecommunications, energy, transport or as well as your gas refinery Skater is a computer system used to gather and analyze riel time data.
03:01
This data is processed by the computer and is presented on a regular basis.
03:07
Skater also saves and makes logs for every event into a long foul that has saved on a hard drive or sent to a printer.
03:16
Skater gives warnings by sounding alarms if situation developed into hazards situations. In short, it's a system that controls multiple industrial control systems.
03:29
Smart devices Willis Internet of things. Basically smart devices such as your smart TV can connect to a home network and gain access to the end. That
03:38
enough thing comprised of small devices such as your ATM cash machines, small robots and wearable technology that can use an I p address and connect to an Internet capable devices.
03:52
Wearable technology has increased in the recent years from Martin your help and perform Mr Sending Texts and receiving calls on your watches.
04:01
Home Automation. These assistant that would control essentially control your lighting, your climate entertainment systems
04:10
alarm system as well as your appliances
04:14
H back off comforters, your heating ventilation, air condition these essentially environmental system that provide and regulate heating and cooling.
04:23
Like other devices, your H Vac system have started connected to a wireless networks and to the Internet.
04:29
This neighbor you to remotely turn on turn off otherwise, can show your H back system from anywhere. It's convenient, but it increases the risk that an attacker could basically maliciously access your H Vac system while making your home or business too cold or too hot isn't a huge security concern.
04:49
An attacker could heat up your server room or data center to cause a denial of service
04:55
as service shut down due to overheating
04:59
system on a chip or S. O. C. Is a no power
05:02
integrate ship that anyways, all the components of a computer on or Elektronik system and, in other words,
05:11
real time operating systems is intended to serve real time application that process data as it comes in, typically without buffer delays
05:23
printer. In other words, motor function devices, or MDF,
05:27
the security implicates of printers and multifunctional vices are tired to data laws,
05:32
images that everyone press I that your continent was securely
05:38
sent to the hacker, who then posted the material on the dark Web or images that everything skin by your employees was secret said to your competitors. These are some of the implication of these devices, and short, they're very vulnerable. For example, Imprinted may have data end, the spool wouldn't be printing off
05:56
and a scandal me haven't image stored in it
05:59
not awards eternal memory
06:01
camera system a majority chemistries and non tend to be network and used for home automation or for security system to protect premises.
06:12
Special purpose, such as your mobile medical devices, can include infusion advice that magic fluids that are given to patients in the hospital.
06:19
What we see also happening with vehicles. As of the last few years, many cars are not connected to the Internet. Some vehicles have artificial intelligence and can drive themselves. We also have aircraft, as was unmanned aerial vehicles. These are mobile aircraft that also embedded half embedded system.
06:36
It was your unmanned aerial vehicles called drones.
06:42
At this point time we have our post assessment. Quist, in fact, is a chew of false statement, and it reads as follows.
06:48
A real time operating system are. TUS is intended to serve real time application that process data as it comes in, typically without buffet delays. This is a true or false statement.
07:04
In this case, if you send it to your absolutely correct
07:10
now, let's take a look at the key takeaways and the order in which they were covered. We learned that mobile medical devices can include infusion devices that measure fluids that are given to patients in hospital
07:21
vehicles as the last few years. Many cars are now connected in some cars, have artificial intelligence and in fact can drive themselves
07:30
aircraft. In other words, unmanned aerial aircraft vehicles we have. The model aircraft also have embedded systems. Unmanned aero vehicles are called drones.
07:43
We learned it. Printers or multi function devices are very vulnerable, for example, and printed may have data in the spolar wouldn't be print off and a skin I may have an image stored in his internal memory.
07:55
We learned that really time operating systems are are two s intended to serve real time applications. That process, doubt as it comes and typically without buffeted, lays
08:07
in our upcoming presentation. We're taking a look at a brand new objective, which is 3.6 what we have to summarize secure application development and deployment concepts. And again, I look forward to seeing you in the very next video

Up Next

CompTIA Security+

Interested in the cybersecurity industry? The CompTIA Security+ is the gold standard for those looking to enter the cybersecurity industry. Join thousands of professionals who have gained this certification through this course and launched their careers in information security.

Instructed By

Instructor Profile Image
Jim Hollis
Independent Contractor
Instructor