First page Back Continue Last page Overview Graphics
Vulnerabilities
When we are tasked with providing security we must know what vulnerabilities exist in order to provide effective controls.
Hardware vulnerabilities:
- “Involuntary machine slaughter” (bumps, coffee, smoke)
- “Machinicide”* hit with hammers, shot, pried open with screwdrivers...
These attacks primarily limit availability