Hardware and Peripheral Security Risks
Having physical access to a computer or other device can enable an unauthorized or uneducated user to make changes to settings that can seriously impact its security and functionality. Conversely, a system administrator can configure hardware settings so that authentication is required, or disable features that could be used for malicious purposes.
- Peripherals are devices that are connected to a computer using cables or wireless technologies.
- Peripherals include scanners, cameras, and other devices, as well as various storage devices like removable drives, USB Flash Drives, memory cards, and other devices and media.
BIOS
BIOS is an acronym for Basic Input/Output System and refers to a chip that resides ...
Get Eleventh Hour Security+ now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.