Basics of embedded firewalls - Exploding the myths
Today there are over 5 billion intelligent, connected devices. The leading technology analyst firm International Data Corporation (IDC) is predicting the number will rise to 15 billion by 20151. Our reliance on embedded devices is growing as embedded devices are showing up in almost every area imaginable.
The Smart Grid, networked cars, medical instrumentation and monitoring systems, factory control systems, and military and homeland security equipment are all examples of connected devices. While these devices make our lives easier and more productive, our reliance on them makes us increasingly vulnerable when they fail.
As embedded devices proliferate, new vulnerabilities continue to be exploited, and attacks against embedded devices are on the rise. Recently reported vulnerabilities include:
- Hacking a car's computer and disabling its brakes, stopping the engine, and controlling other functions; even overriding the driver's commands.
- More than 122 medical devices infected by malware at the U.S. Department of Veterans Affairs.
- Attacks against web servers controlling IP cameras and other web-enabled embedded devices.
- Embedded devices failing from packet floods and Denial of Service (DoS) attacks.
- Reprogramming printers with malicious firmware causing them to forward documents to a remote computer, or run continuously causing failure due to heat buildup.