Record Detail Back
Platform Embedded Security Technology Revealed
Malware, virus, e-mail scam, identity theft, evil maid, password logger, screen scraper… Cyber security concerns everyone. Computers can be your trusted friends or traitors. The Internet is a scary place. Going on the Internet is like walking the streets of a crime-ridden neighborhood. Cyber criminals work to steal your privacy, money, assets, and even identity. Cyber-attacks are intangible, invisible, and hard to detect. Due to the increasing popularity of mobile devices, the danger is several-fold worse today than it was seven years ago. Technologies that created the security problem as a side effect are supposed to resolve the problem. Prevention is the key—the potential loss and cost of dealing with incidents is simply too high to afford. However, it is more difficult to defend a castle than to build it. The mitigation against cyber-attacks is complicated and involves multiple layers of building blocks:
Xiaoyu Ruan - Personal Name
978-1-4302-6572-6
NONE
Management
English
2014
1-263
LOADING LIST...
LOADING LIST...