Which of the following best describes the concept of 'confidentiality' in embedded systems security?
Question 2
In the context of embedded systems, what is the primary role of a 'Hardware Root of Trust' (HRoT)?
Question 3
Which of the following is a common method for performing 'key provisioning' in embedded systems?
Question 4
A 'Denial of Service' (DoS) attack on an embedded system primarily aims to achieve which of the following?
Question 5
Consider an embedded system that uses a hash function to verify the integrity of firmware updates. If the hash function produces a $256$-bit output, and a malicious actor attempts to create a different firmware image with the same hash (a collision), what property of cryptographic hash functions makes this difficult?