Black Hat Physical Device Security артикул 2243e.
Black Hat Physical Device Security артикул 2243e.

This book presents a methodology to approach and detect similar types of vulnerabilities in individual security devices that plague the software industry Bypassing key components in a security system can negate the presence of other subsystems Our content supplies an applicable process of assessment that will never age As long as hardware and озшис software work together and data is sent over wires or airwaves the methods contained in this book will help detect flaws and information leakage in physical security devices Not only do we supply a methodology and checklist for finding common exposures, our book also supplies real world scenarios and shows how bypassing specific equipment can render a security system powerless Though the exposures relate to software in theory, the specific attacks and methods used to assess a given hardware device will be based on that category of devices and technology that relates to those devices For example, data injection into a video stream to provide misinformation to a security system is much like performing data injection attacks to software Intrusion Detection Systems (IDS); however the method of deployment and success vary based not only on the device but on the overall security system architecture.  AdrenalISBN 193226681X.