1.1 Introducing Threats

Embedded systems, particularly those deployed in the field or connected to networks, face a wide range of threats that can compromise their integrity, confidentiality and availability. Understanding the threat model is essential for designing effective protections, such as implementing a Secure Boot mode.