12. Embedded Devices
We might not realize it, but we’re surrounded by embedded computer systems. In this chapter, we take a look at what they are, where they are, why they can be a threat, and what we can do to mitigate the threat.
This brings an important point to mind that we should clarify at the beginning. Embedded systems permeate our lives, but not all of them are a threat. I doubt that you would consider your microwave oven a threat, but most modern microwaves have a microprocessor controlling them. It’s only when we start connecting them to the network that we’re going to start getting worried.
Précis
First, we’re going to discuss what an embedded system is, where they’re located, and why you should be worried. We’ll then go through the ...
Get Endpoint Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.