Welcome to the Cyber Security Landscape
Cue up the music. Welcome to the Jungle. The cyber security landscape is ever-changing and evolving. One could easily compare it to the mercurial New England weather patterns in the Northeast of the United States. Such weather can be dangerous for a hiker; similarly, such changes in cyber threats can be devastating for a technology solution.
In the coming chapters, we will dive deeper into the realm of Linux-embedded systems (or embedded Linux systems, also known as Linux appliances, or simply appliances) and exactly how you can apply this new knowledge to secure your solutions. We’ll make this journey together, and at the end of the tunnel, you will be best positioned to build a better appliance.
This chapter is here just to set the foundation of Linux-embedded systems before we dive deeper. In this chapter, we will cover the following topics:
- What is a Linux-embedded system?
- How are Linux-embedded systems used? ...