Title :
Physical access to computers: can your computer be trusted?
Author_Institution :
Walter Fabian & Associates, Fayetteville, NY, USA
Abstract :
The proliferation of low cost computers has been a boon to productivity. Easier physical access, however, puts computer-based information at greater risk. The information at risk is not limited to unencrypted files stored in the exposed computer. Files encrypted using the exposed computer may be vulnerable. Any computer accessed through the exposed computer, or another computer on the same LAN, may be vulnerable. This paper examines some of the threats that can result from physical access. These include data scavenging, keystroke monitoring and network packet monitoring. Targeted information may be of value in its own right (primary information), or may provide the keys (secondary information) to protected information. Examples of secondary information targets include passwords or encryption keys
Keywords :
access control; authorisation; cryptography; local area networks; LAN; computer access; cryptography; data scavenging; encryption; keystroke monitoring; local area network; low cost computers; network packet monitoring; passwords; physical access; productivity; Computer networks; Computerized monitoring; Costs; Cryptography; Data security; Distributed computing; File systems; Information security; Operating systems; Physics computing;
Conference_Titel :
Security Technology, 1995. Proceedings. Institute of Electrical and Electronics Engineers 29th Annual 1995 International Carnahan Conference on
Conference_Location :
Sanderstead
Print_ISBN :
0-7803-2627-X
DOI :
10.1109/CCST.1995.524920