• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 10. Security > Introduction

10.1. Introduction

Online access to copyrighted entertainment, instantaneous exchange of private messages and the ability to perform financial transactions online are a few of the notable unimaginable revolutions information technology introduced in the last decade of the 20th century. Although these revolutions help make our lives richer and more convenient, they also provide a wide range of opportunities for compromising security and safety. Headlines are often occupied by stories about viruses, hackers and worms, but silent point security compromises, such as illegal reproduction of material, and leaking of financial information and identifies of individuals, have the more significant impact.

Traditional TV equipment did not provide the capabilities of a computer; although TVs utilized microprocessors for performing their functionality, they did not have sophisticated operating systems and did not implement the IP stack that enabled the revolution and compromise security. The lack of connectivity of TV outside the home or office limited the damage of a security compromise (which was very unlikely) to be local and manageable.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint