Summary
In this chapter, you learned a lot about the latest and greatest devices that an attacker can use if they have physical access to your infrastructure and systems.
This knowledge will help you to better understand the current threat landscape, and you will also now be able to easily spot any of those devices and remove them before any major impact occurs to your infrastructure and data.
In fact, I know that every time you enter a conference room, the first thing you will do is look at the projector to make sure there is not a screen crab around.
Also, all this knowledge will help you to create better technical and administrative controls to improve your physical security and enhance your overall defensive security strategy.
Additionally, you learned the value of physical audits, so now you can either enforce them or start implementing them if you haven't already
Now, get ready for the next chapter, in which we are going to take a look at the exciting world...