The Raspberry Pi is a small (credit card-like size), inexpensive, portable computer that connects to real-world objects. It contains all the basics of any computer including a processor, memory and graphics processor. As such, it is capable of doing everything one would expect a regular computer to do. For instance, browse the internet, play high definition videos, create spreadsheets, word processing and more. With its computer-functioning capabilities, the Raspberry Pi was intended to be used for ethical purposes, which it is still used for. It can, however – through a payload – be instructed to carry out malicious, clandestine activity, thus making it a Rogue Device.
With the world currently focusing on health risks, cybersecurity is taking a backseat in almost every industry; public and private. The global economy has been severely impacted by COVID-19, causing businesses to suffer; a cyberattack will only exacerbate the situation. As such, it is imperative – now, more than ever – to address the security risks associated with the Raspberry Pi, whether the intentions of its usage are moral or not, since this device has the ability to carry out perilous cyberattacks. Mitigating an attack is wiser than dealing with the consequences of one.Download e-Book