2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet325/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   321   322   323   324   325   326   327   328   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Input and Output Devices
Input and output devices are often seen as basic, primitive peripherals and usually don’t 
receive much attention until they stop working properly. However, even these basic devices 
can present security risks to a system. Security professionals should be aware of these risks 
and ensure that appropriate controls are in place to mitigate them. The next four sections 
examine some of the risks posed by specific input and output devices.
Monitors
Monitors seem fairly innocuous. After all, they simply display the data presented by the 
operating system. When you turn them off, the data disappears from the screen and can’t 
be recovered. However, technology from a program known as 
TEMPEST
can compromise 
the security of data displayed on a monitor. Generally, cathode ray tube (CRT) monitors 
are more prone to radiate significantly, whereas liquid crystal display (LCD) monitors leak 
much less (some claim not enough to reveal critical data).
TEMPEST is a technology that allows the electronic emanations that every monitor 
produces (known as 
Van Eck radiation
) to be read from a distance (this process is known 
as 
Van Eck phreaking
) and even from another location. The technology is also used to pro-
tect against such activity. Various demonstrations have shown that you can easily read the 
screens of monitors inside an office building using gear housed in a van parked outside on 
the street. Unfortunately, the protective controls required to prevent Van Eck radiation (lots 
and lots of copper!) are expensive to implement and cumbersome to use. It is arguable that 
the biggest risk with any monitor is still shoulder surfing or telephoto lenses on cameras. 
The concept that someone can see what is on your screen with their eyes or a video camera 
is known as 
shoulder surfing
. Don’t forget shoulder surfing is a concern for desktop dis-
plays, notebook displays, tablets, and mobile phones.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   321   322   323   324   325   326   327   328   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish