Understanding the Security Implications of Embedded and Specialist Systems
An embedded system has its own software built into the device hardware. Some are programmable and some are not. Embedded systems are found in consumer products used for health monitoring, automotive, medical, and household products. Some examples follow in the next section.
Internet of Things (IoT)
IoT comprises small devices, such as ATMs, small robots, and wearable technologies, that can use an IP address and connect to internet-capable devices. We must ensure that we change the default usernames and passwords for these devices to prevent someone from hacking them. From a security point of view, supporting IoT items is a nightmare because of the diversity of the devices. Most users of IoT devices are not aware that they have default usernames and passwords, and so they are vulnerable to attack. You should change the default settings immediately after purchase.
Let's look at some of these devices...