• DocumentCode
    3382133
  • Title

    Physical access to computers: can your computer be trusted?

  • Author

    Fabian, Walter

  • Author_Institution
    Walter Fabian & Associates, Fayetteville, NY, USA
  • fYear
    1995
  • fDate
    18-20 Oct 1995
  • Firstpage
    244
  • Lastpage
    251
  • Abstract
    The proliferation of low cost computers has been a boon to productivity. Easier physical access, however, puts computer-based information at greater risk. The information at risk is not limited to unencrypted files stored in the exposed computer. Files encrypted using the exposed computer may be vulnerable. Any computer accessed through the exposed computer, or another computer on the same LAN, may be vulnerable. This paper examines some of the threats that can result from physical access. These include data scavenging, keystroke monitoring and network packet monitoring. Targeted information may be of value in its own right (primary information), or may provide the keys (secondary information) to protected information. Examples of secondary information targets include passwords or encryption keys
  • Keywords
    access control; authorisation; cryptography; local area networks; LAN; computer access; cryptography; data scavenging; encryption; keystroke monitoring; local area network; low cost computers; network packet monitoring; passwords; physical access; productivity; Computer networks; Computerized monitoring; Costs; Cryptography; Data security; Distributed computing; File systems; Information security; Operating systems; Physics computing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Security Technology, 1995. Proceedings. Institute of Electrical and Electronics Engineers 29th Annual 1995 International Carnahan Conference on
  • Conference_Location
    Sanderstead
  • Print_ISBN
    0-7803-2627-X
  • Type

    conf

  • DOI
    10.1109/CCST.1995.524920
  • Filename
    524920