Embedded Developer: May 2015

Page 15

TECH REPORT

The Growing Need to

Protect

YOUR CODE and Your Organization

It is common for burrowing animals—moles, gophers, etc.—to build a second, secret tunnel to escape predators. We humans behave similarly, building secondary portals not only as a means of escape, but as an entryway into our constructs, taking the form of a door to the back porch or a backdoor embedded in code creating a point of access that could circumvent existing access controls.

15


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.