The unauthorized disclosure of information can happen by object reuse, social engineering,
keystroke monitoring, and radiation of signals. Emanation security
involves protecting against attackers intercepting electrical signals that radiate
from computers. There are three countermeasures for emanation attacks:
white noise, control zones, and TEMPEST. There are many attacks on access
controls,however, dictionary and brute force attacks are the most common.
No comments:
Post a Comment