Unit 4 – Lesson 6 – “Data – Hardware”
3 Days
To run software, hardware is essential in every data state. As with software, the hardware can behave unexpectedly. Adversaries try to misuse the hardware by taking advantage of the hardware’s unexpected behavior, bypassing security controls, or use of side channels. This lesson will explore common hardware vulnerabilities and provide hands-on experiences in creating backdoor programs.