Skip to main content

Posts

Showing posts from September, 2018

FMEA Types and steps involved

FMEA means Failure Mode and Effects Analysis. There are 3 types of FMEAs.  System FMEA (SFMEA) Design FMEA  (DFMEA) Process FMEA  (PFMEA) SFMEA is for System and used to analyze the failures of the end product in a customer's system. It focuses on the potential failure modes associated with the functions of the end product.  DFMEA begins with the development of information to understand the system, subsystem or component being analyzed and defines their functional requirements and characteristics. It focuses on potential failure modes associated with the function of each system, subsystem or component being analyzed.  PFMEA is used to analyze manufacturing and assembly processes. It focuses on process inputs.  FMEA Processes - Steps Involved  There are 13 steps in creating an FMEA. Please find the attached diagram. Step 2: Define the Function  What is the system, the sub system or process steps supposed to d...

Anatomy of embedded Linux system

Linus Torvalds released 1st version of Linux kernel in 1991.  Much lower used as desktops and mainly used for embedded applications. In embedded systems, Linux has been ported to many architectures including ARM. It’s an open software, and some pros of open source software - reduces software costs, full control of source code, wide usage of components can improve quality, easy to evaluate new software. In the anatomy of embedded Linux system, these 4 items are very important - Tool chain, Boot loader, Kernel and File system. This is the basic diagram- we have 2 main components Host and Target.  Tool chain indicates the tools and software required for developing software on the target platform. Example compiler, Binutils, C library, debugger, kernel headers etc.  If we have to debug kernel headers, serial debugger can be used. If CPU wants to be debugged,  JTAG debugging tool must be used.  Please refer below image.  Binutils is a coll...

Phishing - Introduction

Many of us receive phishing emails from bank saying “Dear Client, we have to login to your account to verify your credentials. When you actually login by using your details, it says “unable to login” or some error message, in background what happens is your credentials has been stolen and this is what email phishing. What is OAuth (Open Authorization)? Hackers are exploiting a cloud protocol called OAuth . It’s not specific to google attack. OAuth or open standard for authorization is a standardized way for internet accounts to link with 3 rd party applications. It is universally adopted by almost all web-based applications and platforms – including consumer as well as enterprise applications such as google Apps, Microsoft office, sales force and many others. OAuth powers the cloud, enabling the API economy, enhancing user experience.   At the same time in the wrong hands OAuth can be a weapon and it’s a night mare for IT security teams. Example, Attacker set...