Latest Approach to Improve the Protection of Embedded Systems by Using PGP Technique

Download Now
Provided by: International Association of Computer Science & Information Technology (IACSIT)
Topic: Hardware
Format: PDF
In today's world of ubiquitous computing, cyber attacks are becoming more virulent, costlier, and larger in scope than ever before. Unlike previous incarnations of hacking, current attacks on computer systems are professionally coordinated, multifaceted, and motivated by the promise of profits on a massive scale. With millions of new electronic devices connecting to the internet every day, hackers are increasingly focused on a new type of target: mobile and embedded systems. Such systems include point-of-sale terminals, wireless routers, smart phones, networked office machines such as printers, and even the utility infrastructure.
Download Now

Find By Topic