Direct-access attacks ?

An unauthorized user gaining physical access to a computer is most likely able to directly copy data from it. They may also compromise security by making operating system modifications, installing software wormskeyloggerscovert listening devices or using wireless microphones. 









Even when the system is protected by standard security measures, these may be bypassed by booting another operating system or tool from a 
CD-ROM or other bootable media. Disk encryption and Trusted Platform Module are designed to prevent these attacks

0 Comments