02.12.2012 Views

ARM Security Technology Building a Secure System using ...

ARM Security Technology Building a Secure System using ...

ARM Security Technology Building a Secure System using ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Introduction<br />

attack, but is not technically competent. A technical expert will have developed an<br />

attack and published the details of it online; all that the device owner has to do is follow<br />

the recipe and reproduce it.<br />

It is interesting to note that device owners in this category expose themselves to a higher<br />

than usual risk of attack. In their attempts to break the protections that are in place they<br />

mistakenly download prepackaged attack software from websites that are hosted by<br />

hackers; these sites often include viruses and other malware which the users then<br />

inadvertently install on their system.<br />

1-12 Copyright © 2005-2009 <strong>ARM</strong> Limited. All rights reserved. PRD29-GENC-009492C<br />

Non-Confidential Unrestricted Access

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!