Question: 1 . The link below is to an article that discusses the USB Killer attack. InfoSecurity Magazine: USB Breach, Physical Security As you read through
The link below is to an article that discusses the USB Killer attack. InfoSecurity Magazine: USB Breach, Physical Security As you read through the article, pay special attention to how Vishwanath Akuthota carried out this attack. Answer the following questions regarding the attack itself: What is a "USB killer" stick? What is its intended use? How did Vishwanath obtain itHowwasVishwanath caught? What are the steps the college and other organizations should take to mitigate the risk of something this occurring? Read the article below on the USB condom device. USB Condom What are your thoughts regarding the efficacy of this device? Is this something that could or should be deployed in an enterprise? Why or why not?
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
