{"title":"小工具的兴起","authors":"I. Acre","doi":"10.1109/MSECP.2003.1236241","DOIUrl":null,"url":null,"abstract":"The emergence of networkable gadgets, ranging from printers and DSL routers to gaming consoles, cameras, and personal data assistants (PDA), can pose serious risks to an otherwise secure infrastructure. In this installment of Attack Trends, the author examines sample vulnerabilities and research that might point to novel attack vectors that administrators should consider when planning a well thought-out information security strategy.","PeriodicalId":90300,"journal":{"name":"Proceedings. IEEE Symposium on Security and Privacy","volume":"102 1","pages":"78-81"},"PeriodicalIF":0.0000,"publicationDate":"2003-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"The rise of the gadgets\",\"authors\":\"I. Acre\",\"doi\":\"10.1109/MSECP.2003.1236241\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The emergence of networkable gadgets, ranging from printers and DSL routers to gaming consoles, cameras, and personal data assistants (PDA), can pose serious risks to an otherwise secure infrastructure. In this installment of Attack Trends, the author examines sample vulnerabilities and research that might point to novel attack vectors that administrators should consider when planning a well thought-out information security strategy.\",\"PeriodicalId\":90300,\"journal\":{\"name\":\"Proceedings. IEEE Symposium on Security and Privacy\",\"volume\":\"102 1\",\"pages\":\"78-81\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2003-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings. IEEE Symposium on Security and Privacy\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MSECP.2003.1236241\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. IEEE Symposium on Security and Privacy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MSECP.2003.1236241","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The emergence of networkable gadgets, ranging from printers and DSL routers to gaming consoles, cameras, and personal data assistants (PDA), can pose serious risks to an otherwise secure infrastructure. In this installment of Attack Trends, the author examines sample vulnerabilities and research that might point to novel attack vectors that administrators should consider when planning a well thought-out information security strategy.