This article collects main types of attack that can be lead in a data thief.Ĭomputer security can be comprised by devices, such as keyboards, monitors or printers (thanks to electromagnetic or acoustic emanation for example) or by components of the computer, Sony VAIO VGN-NR21E/S Keyboard Hardware could be misused or exploited to get secret data. This article focus on the retrieval of data thanks to misused hardware or hardware failure. Such secret information could be retrieved by different ways. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. Computer security compromised by hardware failure is a branch of computer security applied to hardware.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |