YoVDO

The Hardware Pivot

Offered By: Kaspersky via YouTube

Tags

Conference Talks Courses Cybersecurity Courses Penetration Testing Courses Social Engineering Courses Risk Mitigation Courses Software Vulnerabilities Courses

Course Description

Overview

Explore the dangers of hardware-based attacks in this 22-minute conference talk from Security Analyst Summit 2018. Delve into the growing risk of physical threats as businesses accumulate thousands of devices, increasing their vulnerability to modchips and counterfeit parts. Learn how these physical attacks can lead to the propagation of threats through internal networks. Discover the differences between hardware and software attacks, the role of social engineering, and the concept of pivot hardware. Gain insights into simple pen testing techniques and the potential impact of malicious hardware. Understand why physical access to devices is becoming a more significant concern for organizations with large device inventories.

Syllabus

Introduction
Disclaimers
Hardware vs Software
Social Engineering
Pivot Hardware
Simple Pen Test
Malicious Hardware


Taught by

Kaspersky

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network