HP INCFollow


A connecting device in a public environment looks for a trusted target device that maintains high

security posture. Other devices on the network may learn intent/purpose and might further

generate interest of an adversary already performing enticement to lure connecting devices. A visual

labels of threat immune in an infographic map provides a subtle information of the trusted target

device where a roaming/mobile user need to engage while on the go.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution-Share Alike 4.0 License.