Skip to content

PacktPublishing/The-Embedded-Linux-Security-Handbook

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

24 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

The Embedded Linux Security Handbook

The Embedded Linux Secuirty Handbook

Written by Matt St. Onge Published by Packt Publishing

Originally titled: Mastering Embedded Linux Systems Security

( This repository will contain scripts and code examples from the book along with all the stuff we couldn't fit -- plus much more)

#About The Book

As Embedded Linux systems become ubiquitous, powering countless devices in our daily lives, they’ve become prime targets for cyberattacks. Through this comprehensive guide to safeguarding your Linux devices, Matt St. Onge equips you with the knowledge and tools to mitigate the risks associated with hardware and software vulnerabilities.

This book starts by exploring the world of embedded systems, the brains behind your everyday appliances and takes you through the different types of embedded systems, their uses, and the platforms they run on, while addressing their unique security challenges and support considerations. You’ll learn to build a successful, secure, and user-friendly solution by exploring the critical hardware and software components that form the foundation of a secure appliance. We won't forget the human element; you'll learn how to configure your system to prevent user errors and maintain its integrity. The book lets you put your newfound knowledge into action, guiding you through designing a robust build chain that supports the entire lifecycle of your appliance solution, enabling seamless updates without your direct involvement.

By the end of this book, you’ll be equipped to adapt your appliance to the ever-evolving threat landscape, ensuring its continued security and functionality in real-world conditions.

Chapters:

  1. Welcome to the Cyber Security Landscape
  2. Security Starts at the Design Table
  3. Applying Design Requirements Criteria - Hardware Selection
  4. Applying Design Requirements Criteria - The Operating System
  5. Basic Needs in my Build Chain
  6. Trusted Platform Module
  7. Disk Encryption
  8. Boot, BIOS, and Firmware Security
  9. RPM-OSTREE and the Immutable Operating System
  10. Child-proofing the solution - protecting the device from the End-User & their environment
  11. Knowing the threat landscape - staying informed
  12. Are my devices' communications and interactions secure?
  13. Applying Government Security Standards - Systems Hardening
  14. Customer & Community feedback loops help keep your solution secure

#On Amazon:

https://www.amazon.com/Embedded-Linux-Security-Handbook-deployment/dp/B0DJCDXJ27

#Repository Table of contents: (by folder)

documentation -- this folder contains additional informational resources and documentation

scripts -- this folder contains helpful scripts to use in your lab

CHAP## -- contains files & data specific to a chapter or the exercises found in the book

CHAP##/exercise -- contains lab exercises that supplement exercises for that chapter found in the book

#DISCLAIMER:

THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.

About

Mastering Embedded Linux Security, published by Packt

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages