9. Systems &rArrA Slightly ad-hoc Security Modelling


4th defence: Security Architecture
  • defence in depth
  • signing machine over serial link
  • custom protocol
    • TCP/IP stack attacks
    • easy enough to control and review
  • root keys