19.4.1. Physical Attacks

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/4

flashcard set

Earn XP

Description and Tags

19.4 Physical Security

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

5 Terms

1
New cards

HID

Human Interface Device

anything you plug into a computer that lets you control it, like a keyboard or mouse

2
New cards

Malicious USB Cable

- Looks normal but acts as [[HID]] (Human Interface Device)

- Can type commands to install malware automatically

3
New cards

Malicious USB Flash Drive

- May have hidden electronics or just contain infected files (PDFs, macros, etc.)

- Can act as HID, boot device, or wireless access point

- Auto-run used to be a big risk (less so now on modern OS)

4
New cards

Skimming

- Attacker adds a fake card reader on ATMs or POS systems

- May use a camera to capture PIN

- Tip: Always inspect the card reader before use

5
New cards

Cloning

- Duplicates magnetic stripe data

- Creates a new physical card with stolen info

- Chip cards (EMV) cannot be cloned

- Common with gift cards — attackers wait for activation, then spend it