Securing IoT/IIoT from Software Attacks Targeting Hardware Vulnerabilities

Author(s):  
Nikolaos Foivos POLYCHRONOU ◽  
Pierre-Henri THEVENON ◽  
Maxime PUYS ◽  
Vincent BEROULLE
Keyword(s):  
Author(s):  
Tyler Nighswander ◽  
Brent Ledvina ◽  
Jonathan Diamond ◽  
Robert Brumley ◽  
David Brumley
Keyword(s):  

2013 ◽  
Vol 7 (1) ◽  
pp. 1-15 ◽  
Author(s):  
Nigel Martin ◽  
John Rice

Every day dangerous criminals are targeting high net wealth members of our community as they venture onto the internet. Statements from twenty-nine community organizations and mature age internet users were analyzed using structured coding techniques in order to identify the major criminal risks and threats, and key protective safeguards. The study warns that mature users, particularly those with high net wealth, are critically vulnerable to internet fraud, and personal data and identification theft through spear phishing email and remote access trojan malicious software attacks. The major implication for countries with aging populations, and rising numbers of mature internet users, is the urgent need for ongoing development and resourcing of internet security skills and awareness programs; consumer protection laws and law enforcement assistance; affordable protective internet technologies and complementary support schemes; and the strengthening of online business codes and standards, particularly in dealings with older people.


2003 ◽  
Vol 8 (1) ◽  
pp. 55-66 ◽  
Author(s):  
Pierre Girard ◽  
Jean-Luc Giraud
Keyword(s):  

2021 ◽  
Author(s):  
Michael Mattioli ◽  
Atte Lahtiranta

<div><div><div><p>Video game consoles share many of the characteristics of an ideal device for use in enterprise deployments. In comparison to many desktop and notebook PCs available in the market, modern video game consoles are actually quite powerful and capable. They provide an excellent user experience with simple and intuitive setup and operation. At the heart of the design of many modern video game consoles is security; they are remarkably resilient against very sophisticated hardware and software attacks. They are also rather cost-effective in comparison to modern PCs.</p></div></div></div>


2020 ◽  
Author(s):  
Michael Mattioli ◽  
Atte Lahtiranta

<div><div><div><p>Video game consoles share many of the characteristics of an ideal device for use in enterprise deployments. In comparison to many desktop and notebook PCs available in the market, modern video game consoles are actually quite powerful and capable. They provide an excellent user experience with simple and intuitive setup and operation. At the heart of the design of many modern video game consoles is security; they are remarkably resilient against very sophisticated hardware and software attacks. They are also rather cost-effective in comparison to modern PCs.</p></div></div></div>


2021 ◽  
Author(s):  
Michael Mattioli ◽  
Atte Lahtiranta

<div><div><div><p>Video game consoles share many of the characteristics of an ideal device for use in enterprise deployments. In comparison to many desktop and notebook PCs available in the market, modern video game consoles are actually quite powerful and capable. They provide an excellent user experience with simple and intuitive setup and operation. At the heart of the design of many modern video game consoles is security; they are remarkably resilient against very sophisticated hardware and software attacks. They are also rather cost-effective in comparison to modern PCs.</p></div></div></div>


Sign in / Sign up

Export Citation Format

Share Document