Part 3: Why security needs to be considered from the outset.
We love our wearables, but wearable devices connected to public networks supporting bi-directional data flow make our devices…and us…highly susceptible to attack. Security can no longer be thought of as an “afterthought” to embedded system design; development teams must design in security methods and adopt a security development lifecycle approach that meets the appropriate security level. Designing embedded software with the proven security capabilities of Mentor Graphics Nucleus RTOS and Nucleus SafetyCert to meet the stringent safety and regulatory requirements for embedded systems, with a process model for space partitioning and support of ARM Trustzone technology, can protect your embedded design against security threats.
To read more, click here.