{"title":"The rise of the gadgets","authors":"I. Acre","doi":"10.1109/MSECP.2003.1236241","DOIUrl":null,"url":null,"abstract":"The emergence of networkable gadgets, ranging from printers and DSL routers to gaming consoles, cameras, and personal data assistants (PDA), can pose serious risks to an otherwise secure infrastructure. In this installment of Attack Trends, the author examines sample vulnerabilities and research that might point to novel attack vectors that administrators should consider when planning a well thought-out information security strategy.","PeriodicalId":90300,"journal":{"name":"Proceedings. IEEE Symposium on Security and Privacy","volume":"102 1","pages":"78-81"},"PeriodicalIF":0.0000,"publicationDate":"2003-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. IEEE Symposium on Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MSECP.2003.1236241","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
The emergence of networkable gadgets, ranging from printers and DSL routers to gaming consoles, cameras, and personal data assistants (PDA), can pose serious risks to an otherwise secure infrastructure. In this installment of Attack Trends, the author examines sample vulnerabilities and research that might point to novel attack vectors that administrators should consider when planning a well thought-out information security strategy.