Sponsored Links

Sabtu, 23 Juni 2018

Sponsored Links

Download Surreptitious Software Obfuscation Watermarking and ...
src: s1-ssl.dmcdn.net

Tamperproofing is a term sometimes used for methodologies used to inhibit, block or detect unauthorized access to a device or circumvent a security system.

Because any device or system can be foiled by someone with knowledge, tools, time, etc. Suffice, the term "tamperproof" is a misnomer. Tamper resistance and destructive systems and devices are better terminology.


Video Tamperproofing



Mechanical

Some devices contain non-standard screws or screws in an attempt to block access. An example is the phone switching cabinet (which has a head triangle bolt that fits the hex socket) and a computer hard drive, which usually has a star-shaped head for the screw, known as the Torx head. Drivers for these heads are generally available from electronic retailers.

Maps Tamperproofing



Electricity

This tamper resistance style is most commonly found in burglar alarms. Most travel devices (eg pressure pads, passive infrared sensors (motion detectors), door switches) use two signal cables that, depending on the configuration, are usually open or usually closed. Sensors sometimes require power, so to simplify the cable running, multi-core cables are used. While 4 cores are usually enough for devices that require power (leaving two spare for those who do not have it), cables with additional cores can be used. This additional core can be transferred into a special "tamper circuit" in the alarm system.

The tamper circuit is the same as any other zone (in this case either n.o. or n.c.) with the exception that the system monitors 24 hours. Attackers will risk triggering an alarm by trying to circumvent a given device.

Sensors such as motion detectors, tilt detectors, air pressure sensors, light sensors, etc., which may be used in some burglar alarms, may also be used in bombs to prevent defusions.

Read Surreptitious Software: Obfuscation Watermarking and ...
src: s1.dmcdn.net


See also

  • Tamper-resistant switch

Download Surreptitious Software Obfuscation Watermarking and ...
src: s1.dmcdn.net


References

Source of the article : Wikipedia

Comments
0 Comments