Map
Index
Random
Help
th

QuoteRef: nislE1_2007




Topic:
limitations of system security
Group:
security

Reference

Nisley, E., "Root the vote: the hard and the soft", Dr. Dobb's Journal, January 2007, pp. 56-58. Google

Other Reference

Nisley, E., "Root the vote: Wetware", Dr. Dobb's Journal, February 2007 75-78

Quotations
56 ;;Quote: physical access to a device negates the security of its software contents; e.g., media players and game boxes
57 ;;Quote: tampering with a mechanical voting machine is visible after the fact; but a software attack can leave the machine exactly the same

Related Topics up

Topic: limitations of system security (39 items)
Group: security   (23 topics, 874 quotes)

Collected barberCB 2/07
Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.