Hardware Concerns
Access
Theft
Environmental considerations
Media protection
Media declassification/destruction
Lack of built in security mechanisms
Electromagnetic emanations (TEMPEST)
Hardware modifications
Hardware attacks
Previous slide
Next slide
Back to first slide
View graphic version