Many of the standards developed by VITA working groups are for defining modules that are part of Open System Architectures (OSA) - whether they are VME, VPX, PMC, FMC or one of many other standards. These modules are used to build critical embedded systems that are deployed in a variety of application platforms. Today these platforms are typically connected via a network, a network that is often susceptible to cyberattacks. This article introduces you to high level concerns and challenges facing designers using Open System Architecture (OSA) modules.
I had a chance to attend an IEEE cybersecurity presentation recently and left wanting to ditch all my computers and smartphones to move into the deep woods as far off the grid as possible. The presentation included very high-level demonstrations of several common methods that attackers use to gain access to your PC or smartphone. Readily available hardware and software were used to illustrate how easy it is for someone to gain unauthorized access. Within a matter of seconds, a cyber attacker can monitor your every keystroke during a public hotspot session. To top that, allow them physical access to one of your devices and they can inject a worm in two to three seconds, which gives them complete remote access to your device and anything that it connects to in your personal or business environment.
Curtiss-Wright to Add Intel(r) Trusted Execution Technology (TXT) Support to its TrustedCOTS(tm) Data Security Solutions
INTEL(r) TXT WILL EXPAND CURTISS-WRIGHT'S TCOTS CAPABILITIES FOR PROTECTING CRITICAL TECHNOLOGIES AND DATA IN DEPLOYED EMBEDDED COMPUTING SYSTEMS