DocumentCode
3382133
Title
Physical access to computers: can your computer be trusted?
Author
Fabian, Walter
Author_Institution
Walter Fabian & Associates, Fayetteville, NY, USA
fYear
1995
fDate
18-20 Oct 1995
Firstpage
244
Lastpage
251
Abstract
The proliferation of low cost computers has been a boon to productivity. Easier physical access, however, puts computer-based information at greater risk. The information at risk is not limited to unencrypted files stored in the exposed computer. Files encrypted using the exposed computer may be vulnerable. Any computer accessed through the exposed computer, or another computer on the same LAN, may be vulnerable. This paper examines some of the threats that can result from physical access. These include data scavenging, keystroke monitoring and network packet monitoring. Targeted information may be of value in its own right (primary information), or may provide the keys (secondary information) to protected information. Examples of secondary information targets include passwords or encryption keys
Keywords
access control; authorisation; cryptography; local area networks; LAN; computer access; cryptography; data scavenging; encryption; keystroke monitoring; local area network; low cost computers; network packet monitoring; passwords; physical access; productivity; Computer networks; Computerized monitoring; Costs; Cryptography; Data security; Distributed computing; File systems; Information security; Operating systems; Physics computing;
fLanguage
English
Publisher
ieee
Conference_Titel
Security Technology, 1995. Proceedings. Institute of Electrical and Electronics Engineers 29th Annual 1995 International Carnahan Conference on
Conference_Location
Sanderstead
Print_ISBN
0-7803-2627-X
Type
conf
DOI
10.1109/CCST.1995.524920
Filename
524920
Link To Document