Question: 1 . The link below is to an article that discusses the USB Killer attack. InfoSecurity Magazine: USB Breach, Physical Security As you read through

1. The link below is to an article that discusses the USB Killer attack. InfoSecurity Magazine: USB Breach, Physical Security As you read through the article, pay special attention to how Vishwanath Akuthota carried out this attack. 2. Answer the following questions regarding the attack itself: What is a "USB killer" stick? What is its intended use? How did Vishwanath obtain it?HowwasVishwanath caught? What are the steps the college (and other organizations) should take to mitigate the risk of something this occurring? 3. Read the article below on the USB condom device. USB Condom What are your thoughts regarding the efficacy of this device? Is this something that could (or should) be deployed in an enterprise? Why or why not?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!