Chapter 1

Introduction to Security Threats

Our world is increasingly descending into the ancient vision of “good” versus “evil,” or at least the opposites of “ying” versus “yang.” The concentration of fresh talent in hot spots around the globe is resulting in innovative products and apps providing enhanced capabilities for an increasing number of users. From smartphones to smart cars, the “Internet of Things” is now upon us. The great companies of our times continue to experiment and introduce connective technologies that satisfy human needs and frequently create those needs. But simultaneously, the “evil” side is growing even faster in its capability, employing those very same technologies for malicious purposes.

Where technology users were ...

Get Network and Data Security for Non-Engineers now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.