Members Only Content
Time to Think About the How and Where of Cryptography (Download)
Dec. 8, 2022
Check out the other chapters in the Communication Series: The Cryptography Handbook
Threats from various sources relentlessly attack all our connected systems. Connected systems don’t necessarily mean those connected to the internet. It could also include a pulse oximeter connected to a patient in a hospital environment or a printer cartridge connected to a printer. The current plethora of Internet of Things (IoT) devices like thermostats and refrigerators are also susceptible to hacking. Let’s look at a few of these threats and learn how to protect your devices and see what kind of planning you need to do.
Comments
Comments