Topic: limitations of system security
Group: security
| |
Reference
Nisley, E.,
"Root the vote: the hard and the soft",
Dr. Dobb's Journal, January 2007, pp. 56-58.
Google
Other Reference
Nisley, E., "Root the vote: Wetware", Dr. Dobb's Journal, February 2007 75-78
Quotations
56 ;;Quote: physical access to a device negates the security of its software contents; e.g., media players and game boxes
| 57 ;;Quote: tampering with a mechanical voting machine is visible after the fact; but a software attack can leave the machine exactly the same
|
Related Topics
Topic: limitations of system security (39 items)
Group: security (23 topics, 874 quotes)
|