Drew Miller9781932266818, 193226681X
The security devices of today are much more complex than those long ago. While some still are just electronic transistors, diodes, capacitors and resistors, many now have software and communication-based features. Easy-to-use and easy-to-deploy, microprocessors and hard drives are common and used in car Global Positioning Systems (GPS), telephones, and even portable video game systems. Black Hat Physical Device Security looks at the risk involved with network hardware, home security, security installation companies, biometric devices, and much more. This is the book that answers the questions: How can I protect against physical device exposures if I already have these systems in place? How do I factor risk from not having a secure method of communication over a network that is not trusted I have one or more tools that I use to test for these types of exposures in software and hardware that we manufacture. Do I need to do more than that? So much of the data that I would record through monitoring can be spoofed, so why record it at all? Can you break any embedded device with physical access? If we place high-level communication processes within our devices, isn’t that creating more problems then simply plugging wires that carry raw signals into these devices? |
Table of contents : Black Hat Physical Device Security _ Exploiting Hardware and So.pdf……Page 1 Black Hat Physical Device Security _ Exploiting Hardware and SoP2.pdf……Page 62 Black Hat Physical Device Security _ Exploiting Hardware and SoP3.pdf……Page 140 |
Reviews
There are no reviews yet.