Electromagnetic spying is a method of surfing electromagnetic waves in order to access information about a desired target. If a device has a connection to a power line, it can generate electromagnetic radiation that makes it at liberty to be interrupted by any proven technology. If the computer that is being targeted is directly connected to a power line, it is easier for the spies to have access to it. In the ground line, there are voltage fluctuations that are compatible and similar to keystrokes produce noise. When a hacker is nearby, they can interrupt the ground line noise and gain access. To deal with electromagnetic spying, the best thing is to shield the room by covering the walls with foil and use generators for peculiar noises. There is also the use of a noise generator that is manual in cases where the secrets are not that expensive (Vladislav, 2019).
Response to Goddard
Access control is the practice of granting permission to enter a building or are authorized to see certain firm information. Certain individuals are granted access cards or badges that identify them before they are allowed to access the secured areas. The access control systems have essential components that include the user-facing, where the individuals are granted access by ownership of access cards. The admin facing involves the access management dashboard or the API. The infrastructure consists of the use of electric doors and access control panels. Three other significant options that can be used in systems of access control include the cloud-based access control, which allows the administrator to manage access from wherever they are since the system is stored in the cloud. The second significant option is smartphone-based control, which entails access obtained once the individual has downloaded the app and logged in their credentials and accepted. Lastly is the IoT-based control, where the doors and locks are connected to the internet and can be upgraded for security reasons (KISI, n.d.).
Response to Vick
The BIOS is a software that can be found in the motherboard in a memory chip. When power has been removed from the device, the BIOS can still be recoverable since its settings are already saved. Its function is to give instructions to the computer on how to boot and perform keyboard control. It is also used to configure computer hardware such as memory, CPU, among others. To have access to the BIOS, one needs to go through the BIOS set-up utility where all the options are configured. A machine is manufactured with its BIOS, and there is no need to install it. It functions on its own and does not depend on the operating system of the device. A number of things can be done in the BIOS systems including, change of floppy drive settings, changing the CPU settings, look at the amount of memory that has been installed, among others (Tim, 2020).
KISI. (n.d.). Understanding Access Control Systems. Retrieved from KISI: https://www.getkisi.com/access-control
Tim, F. (2020, February 26). What is BIOS (Basic Input Output System)? Retrieved from Lifewire: https://www.lifewire.com/bios-basic-input-output-system-2625820
Vladislav, B. (2019). Five Cyber Spy Technologies that cannot be Stopped by Going Offline. Retrieved from Kaspersky daily: https://www.google.com/amp/s/www.kaspersky.com/blog/when-going-offline-doesnt-help/9078/amp/