Your penetration testing team installs an in-line hardware key logger onto one of your network machines. Which of the following is of major concern to the security organization?
In-line hardware keyloggers are physical devices placed between a keyboard and a computer.
They are a concern because they are not detectable by software-based monitoring tools, posing a significant risk to the confidentiality of sensitive information.
Why Other Options Are Incorrect:
A. Don’t require physical access: Physical access is required to install the hardware.
B. Don’t comply with regulations: While true, this is a secondary concern compared to their undetectability.
D. Are relatively inexpensive: Cost is a factor but not the primary security concern.
EC-Council CISO Reference:The curriculum addresses the risks posed by hardware-based attacks and the need for physical security controls to mitigate such threats.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit