- During any free time I have, I work diligently to learn every possible aspect regarding cyber systems security and the vulnerabilities, from the network layer of wireless communications down to the latter parts of the file systems with which they exchange information My research has led me to educate myself on the reverse engineering of embedded systems, due to the acquired knowledge I've gained over the past 13 years shows that to fully understand security as a whole, the understanding of a system's physical layer of security is the key In that, the goal of all malicious exploits and cyber attacks have the same common goal, which is to successfully run a piece of code in hopes of execution by the kernel or the core of the operating system If an attacker can get the core that communicates directly with a system Central Processing Unit to execute the malicious code, the processor will service the requested system call to memory and in return permit entry into the system or return and expose sensitive data never intended to be viewed by outside hosts