Exploring physical security controls
Attackers with physical access to the target are normally after high-value assets whose compromise can be leveraged on a larger scale. For example, they may be interested in recovering global secrets, reverse engineering software, or even simply mounting denial-of-service (DoS) attacks through a physical attack surface. While most physical-based attacks require direct access to the target, some can be carried out by simply being within proximity to the target. In this section, we briefly survey cybersecurity controls implemented through hardware, software, and packaging techniques to raise the difficulty of physical-based attacks.
Tamper detection and prevention
While not the most effective at eliminating risk, physical security measures, such as tamper-evident seals or secure enclosures, can be useful in preventing or detecting unauthorized physical access to the system by raising the difficulty level of carrying out such attacks. For example...