Black Hat Physical Device Security
暫譯: 黑帽子實體設備安全
Drew Miller, Rob Shein, Michael Bednarczyk, Black Hat Services
- 出版商: Syngress Media
- 出版日期: 2005-02-01
- 定價: $1,550
- 售價: 5.0 折 $775
- 語言: 英文
- 頁數: 448
- 裝訂: Hardcover
- ISBN: 193226681X
- ISBN-13: 9781932266818
-
相關分類:
資訊安全
立即出貨(限量) (庫存=2)
買這商品的人也買了...
-
$390$257 -
$780$616 -
$1,110$1,055 -
$440$348 -
$490$417 -
$200$158 -
$2,050$1,948 -
$1,860$1,767 -
$680$646 -
$550$468 -
$950$751 -
$680$537 -
$680$578 -
$450$351 -
$520$442 -
$350$298 -
$350$298 -
$690$545 -
$620$489 -
$600$480 -
$720$612 -
$650$507 -
$880$748 -
$580$458 -
$600$474
相關主題
商品描述
Description:
Attacking & Defending Physical Devices for Software and Hardware Engineers
The security devices of today are much more complex than those long ago. While some still are just electronic transistors, diodes, capacitors and resistors, many now have software and communication-based features. Easy-to-use and easy-to-deploy, microprocessors and hard drives are common and used in car Global Positioning Systems (GPS), telephones, and even portable video game systems. Black Hat Physical Device Security looks at the risk involved with network hardware, home security, security installation companies, biometric devices, and much more. This is the book that answers the questions:
How can I protect against physical device exposures if I already have these systems in place?
How do I factor risk from not having a secure method of communication over a network that is not trusted
I have one or more tools that I use to test for these types of exposures in software and hardware that we manufacture. Do I need to do more than that?
So much of the data that I would record through monitoring can be spoofed, so why record it at all?
Can you break any embedded device with physical access?
If we place high-level communication processes within our devices, isn’t that creating more problems then simply plugging wires that carry raw signals into these devices?
And many more…
Attacking & Defending Physical Devices for Software and Hardware Engineers
Identify Individuals Using Biometric Authentication Devices
Defend Monitoring, Detection, and Authentication Devices from Manipulation and Malicious Attacks
Integrate Monitoring Devices Including Streaming Video and Always-On Cameras with Active and Passive Detection Systems
商品描述(中文翻譯)
**描述:**
《攻擊與防禦物理設備:針對軟體和硬體工程師》
當今的安全設備比以往任何時候都要複雜。雖然有些設備仍然只是電子晶體管、二極體、電容器和電阻器,但許多設備現在擁有基於軟體和通信的功能。微處理器和硬碟易於使用且易於部署,廣泛應用於汽車全球定位系統(GPS)、電話,甚至便攜式遊戲系統。《黑帽物理設備安全》探討了與網路硬體、家庭安全、安全安裝公司、生物識別設備等相關的風險。本書回答了以下問題:
如果我已經有這些系統,如何保護自己免受物理設備暴露的風險?
如果我沒有安全的通信方法在不受信任的網路上,如何考量風險?
我有一個或多個工具用來測試我們製造的軟體和硬體中這類暴露的風險。我需要做更多的事情嗎?
我通過監控記錄的數據中有很多可以被偽造,那麼為什麼還要記錄它?
如果我有物理訪問權限,能否破解任何嵌入式設備?
如果我們在設備中放置高級通信過程,這是否會比僅僅將傳輸原始信號的電線插入這些設備更造成問題?
還有許多其他問題……
《攻擊與防禦物理設備:針對軟體和硬體工程師》
識別使用生物識別身份驗證設備的個體
防禦監控、檢測和身份驗證設備免受操控和惡意攻擊
整合包括串流視頻和隨時開啟的攝像頭的監控設備,與主動和被動檢測系統相結合