Internet security is of utmost importance in today's e-commerce environment. Many different avenues are being taken in an attempt to secure the systems of both the end user as well as the server of information. The operating system, as well as application software, provide holes through which security is breached. One vulnerable part of the system that has not received much attention is the hardware. This study examines how various Internet appliances can be classified according to their vulnerabilities.
Joseph G. Tront, Randy C. Marchany