Computer security compromised by hardware failure: Difference between revisions

Content deleted Content added
Citation bot (talk | contribs)
m Alter: isbn, title, periodical. Add: citeseerx, chapter-url. Removed parameters. | You can use this bot yourself. Report bugs here. | User-activated.
m typo: lead→led (via WP:JWB)
Line 5:
 
'''Computer security compromised by hardware failure''' is a branch of [[computer security]] applied to hardware.
The objective of computer security includes protection of information and property from theft, corruption, or [[natural disaster]], while allowing the information and property to remain accessible and productive to its intended users.<ref name="ComSec1">[[Computer security]]</ref> Such secret information could be retrieved by different ways. This article focus on the retrieval of data thanks to misused hardware or hardware failure. Hardware could be misused or exploited to get secret data. This article collects main types of attack that can be lead in ato data thieftheft.
 
Computer security can be comprised by devices, such as keyboards, monitors or printers (thanks to electromagnetic or acoustic emanation for example) or by components of the computer, such as the memory, the network card or the processor (thanks to time or temperature analysis for example).