Using Layer 2 or 3 Switches to Augment Information Assurance in Modern ATE
Title | Using Layer 2 or 3 Switches to Augment Information Assurance in Modern ATE |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Headrick, William J, Subramanian, Gokul |
Conference Name | 2019 IEEE AUTOTESTCON |
Publisher | IEEE |
ISBN Number | 978-1-7281-2832-0 |
Keywords | ATE, Collaboration, composability, computer, cyber security, Human Behavior, information assurance, Metrics, policy-based governance, pubcrawl, resilience, Resiliency, Scalability |
Abstract | For modern Automatic Test Equipment (ATE) one of the most daunting tasks is now Information Assurance (IA). What was once at most a secondary item consisting mainly of installing an Anti-Virus suite is now becoming one of the most important aspects of ATE. Given the current climate of IA it has become important to ensure ATE is kept safe from any breaches of security or loss of information. Even though most ATE are not on the Internet (or even on a local network for many) they are still vulnerable to some of the same attack vectors plaguing common computers and other electronic devices. This paper will discuss one method which can be used to ensure that modern ATE can continue to be used to test and detect faults in the systems they are designed to test. Most modern ATE include one or more Ethernet switches to allow communication to the many Instruments or devices contained within them. If the switches purchased are managed and support layer 2 or layer 3 of the Open Systems Interconnection (OSI) model they can also be used to help in the IA footprint of the station. Simple configurations such as limiting broadcast or multicast packets to the appropriate devices is the first step of limiting access to devices to what is needed. If the switch also includes some layer 3 like capabilities Virtual Local Area Networks can be created to further limit the communication pathways to only what is required to perform the required tasks. These and other simple switch configurations while not required can help limit the access of a virus or worm. This paper will discuss these and other configuration tools which can help prevent an ATE system from being compromised. |
URL | https://ieeexplore.ieee.org/document/8961073 |
DOI | 10.1109/AUTOTESTCON43700.2019.8961073 |
Citation Key | headrick_using_2019 |