Avatar feed
Responses: 3
Lt Col John (Jack) Christensen
4
4
0
Way over my head!
(4)
Comment
(0)
PO1 William "Chip" Nagel
PO1 William "Chip" Nagel
3 y
Lt Col John (Jack) Christensen SGT (Join to see) Don't Feel Bad Gents, I used to do part of the TEMPEST Certifications but I'd be Totally Lost Now.
(2)
Reply
(0)
SGT Unit Supply Specialist
SGT (Join to see)
3 y
PO1 William "Chip" Nagel - Is it done manually today or compueterized?
(2)
Reply
(0)
PO1 William "Chip" Nagel
PO1 William "Chip" Nagel
3 y
SGT (Join to see) - I Imagine it is all done with Computers and a Little Imagination.
(2)
Reply
(0)
SGT Unit Supply Specialist
SGT (Join to see)
3 y
PO1 William "Chip" Nagel - A "Little Imagiation" to tweak it ?
(1)
Reply
(0)
Avatar small
CWO3 Us Marine
3
3
0
Can't wait for Quantum computing. Not just ones and zeros, but everything in between.
(3)
Comment
(0)
Avatar small
SGT Unit Supply Specialist
3
3
0
PO1 William "Chip" Nagel
Optical Attacks

....Like other side channel attacks, these range from the relatively simple (eavesdropping on a monitor via reflections) through to complex (communicating with an infected device via LED blinks). In a more hi-tech optical attack, lasers can be used to both read key strokes and inject faults that are later read to deduce the cryptographic key being sought.

Side Channel Attacks in General

Many of these attacks can be used to leverage other attacks, thus gaining more information about the target. If you are working in a high security environment, you will already know many of the ways to mitigate against these types of attacks. This is way many secure facility employ TEMPEST surveys. Regardless if you are working in a secure facility or not, there is chance someone is after your data and you need to look into ways to protect yourself.

The only way to fully protect against side channel attacks is to use your digital devices in a room buried deep underground, accessed by a long tunnel with shielded doors, lined with a Faraday cage, and running off of your own portable power supply. Luckily, very few people are in a position where the data they are working with is quite this sensitive. We are far more likely to fall victim to the “soft” end of side-channel access — BLE beacon powered advertising and the like, so rest easy.

Sources: medium.com
Edited by Mario Vulcano
(3)
Comment
(0)
Avatar small

Join nearly 2 million former and current members of the US military, just like you.

close