“Intro to the Challenge of Cybersecurity – Unit 4 – Lesson 6”

Unit 4 – Lesson 6 – “Data – Hardware”

3 Days

To run software, hardware is essential in every data state. As with software, the hardware can behave unexpectedly. Adversaries try to misuse the hardware by taking advantage of the hardware’s unexpected behavior, bypassing security controls, or use of side channels. This lesson will explore common hardware vulnerabilities and provide hands-on experiences in creating backdoor programs.