9. Systems
⇐
&rArr
A Slightly ad-hoc Security Modelling
4th defence: Security Architecture
defence in depth
signing machine over serial link
custom protocol
TCP/IP stack attacks
easy enough to control and review
root keys