Lisa Compact
95
·
Expert knowledge of the Lisa architecture
·
Very good knowledge of decompiling the Lisa software
·
Expert knowledge in reproducing the Lisa functionality and adding malicious code to it
·
Good hacking skills to install the 'infected' application to the device
·
Expert hacking skills to gather data in the network and communicate that data outside of the network
This makes the Lisa an unattractive and highly improbable device to target for 'infection'. There will be
more 'interesting', more common, devices in a network that are easier to attack.
How can the security impact of the Lisa on the network be minimized?
By placing the Lisa outside the local network in a well-configured DMZ, the Lisa can be denied access
to the local network. In such a setup, the Lisa cannot be used to attack other devices in the local
network, even in the theoretical case that the Lisa would be 'infected'.
Содержание Lisa Compact
Страница 1: ...Lisa Compact Updated on 6 23 2020 for software version 1 44 User Manual ...
Страница 108: ... 2020 Streamit B V ...