O'Reilly logo

Foundations of Information Security by Jason Andress

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

12MOBILE, EMBEDDED, AND INTERNET OF THINGS SECURITY

Image

So far, I’ve assumed that you’ll be protecting information contained on traditional desktop or laptop computers. However, you’ll also find vulnerable devices in your pockets, heating and air conditioning systems, security systems, hospital rooms, cars, and a dizzying array of other places. That’s why your security program should include mobile devices, Internet of Things devices, and embedded devices. Internet of Things devices, such as cameras or medical devices, are any internet-connected devices that don’t run a full desktop operating system. Embedded devices are computers that run inside ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required