Embedded Devices Overview: Does Security Match The Evolution Of Technology

Costin Carabaș, Nicolae Țăpuș

Abstract


The Internet and IT&C industry started in the middle 20th century and had an extremely rapid evolution. It has had an impact on the whole planet and has helped humankind achieve greatness. This evolution also had some negative aspects. Technology was often used to do harm to people, institutions, corporations and so on. Nowadays, security has an important role in any computer science project development.

This paper aims to create an overview of the security aspects in major projects of our time, such as operating systems, applications, internet communication. The Introduction describes a short history of the IT&C evolution, and its importance. The Mobile Devices section presents a classification of the current mobile devices regarding software and hardware. The Security Development chapter is an overview of the security solutions used in computer science, its evolution and the direction the industry is heading. The following chapters are Motivation and Conclusion.


Keywords


Tehnology Evolution, Analysis, Software, Hardware, Security.

Full Text:

PDF

References


A. Tanweer, “A Reliable Communication Framework and Its Use in Internet of Things (IoT)”, 2018

Youssef Bassil, “A simulation model for the waterfall software development life-cycle”, CoRR abs/1205.6904, 2012

Suhar Kumar, “Fundamental limits to Moore’s Law”, 2015

Marko Wolf and Timo Gendrullis. Design, implementation, and evaluation of a vehicular hardware security module. In Howon Kim, editor, Information Security and Cryptology - ICISC 2011 , pages 302–318, Berlin, Heidelberg, 2012. Springer Berlin Heidelberg.

Nabil Mohammed Ali Munassar and A Govardhan. A comparison between five models of software engineering. International Journal of Computer Science Issues (IJCSI), 7(5):94, 2010

Lowell Lindstrom and Ron Jeffries. Extreme programming and agile software development methodologies. Information Systems Management, 21(3):41–52, 2004

Kouatli Issam. A comparative study of the evolution of vulnerabilities in it systems and its relation to the new concept of cloud computing. 20(4):409–433, 2019/12/10 2014

J. R. C. Nurse, S. Creese, M. Goldsmith, and K. Lamberts. Guidelines for usable cyber-security: Past and present. In 2011 Third International Workshop on Cyberspace Safety and Security (CSS) , pages 21–26, Sep. 2011.

Karl Rupp, 48 Years of Microprocessor Trend Data, https://github.com/karlrupp/microprocessor-trend-data




DOI: http://dx.doi.org/10.52155/ijpsat.v24.1.2556

Refbacks

  • There are currently no refbacks.


Copyright (c) 2021 Costin Carabaș, Nicolae Țăpuș

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.