ARM Security Technology Building a Secure System using ...
ARM Security Technology Building a Secure System using ...
ARM Security Technology Building a Secure System using ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Introduction<br />
attack, but is not technically competent. A technical expert will have developed an<br />
attack and published the details of it online; all that the device owner has to do is follow<br />
the recipe and reproduce it.<br />
It is interesting to note that device owners in this category expose themselves to a higher<br />
than usual risk of attack. In their attempts to break the protections that are in place they<br />
mistakenly download prepackaged attack software from websites that are hosted by<br />
hackers; these sites often include viruses and other malware which the users then<br />
inadvertently install on their system.<br />
1-12 Copyright © 2005-2009 <strong>ARM</strong> Limited. All rights reserved. PRD29-GENC-009492C<br />
Non-Confidential Unrestricted Access