Security Challenges in Embedded Systems: A Review of USA and African Perspectives
Abstract
This Review provides a glimpse into the security challenges faced by embedded systems, with a focus on the divergent perspectives of the United States (USA) and Africa. Embedded systems, integral to diverse applications from industrial automation to IoT devices, are susceptible to an array of security threats. In the USA, a developed technological landscape presents challenges like sophisticated cyberattacks, potential espionage, and the growing risk of supply chain vulnerabilities. The review delves into the advanced cybersecurity measures implemented in the USA and explores ongoing efforts to mitigate emerging threats. Contrastingly, the African perspective introduces unique challenges stemming from the digital divide, varying technological infrastructures, and a growing dependence on embedded systems for critical services. The review sheds light on the prevalence of cyber threats in African nations, including malware attacks, data breaches, and the exploitation of vulnerabilities in embedded systems. Additionally, it explores the socioeconomic implications of inadequate security measures, emphasizing the need for region-specific strategies to bolster embedded system security. The Review underscores the importance of a comprehensive approach to address security challenges in embedded systems, encompassing robust cybersecurity frameworks, international collaboration, and tailored solutions to meet the distinct needs of both the USA and Africa. As technological landscapes continue to evolve, understanding the nuanced perspectives on security challenges becomes imperative for fostering a secure and resilient global embedded systems ecosystem.
How to Cite This Article
Ojong Felix Enow, Ebimor Yinka Gbabo, Andrew Tochukwu Ofoedu, Possible Emeka Chima (2023). Security Challenges in Embedded Systems: A Review of USA and African Perspectives . Journal of Frontiers in Multidisciplinary Research (JFMR), 4(1), 458-464. DOI: https://doi.org/10.54660/.JFMR.2023.4.1.458-464