10 likes | 226 Views
Physical Security. Slides from Michael Goodrich & Roberto Tamassia’s “Introduction to Computer Security” . Basically: any user who has access to any lock in the system and a working key to that lock can fairly easily reverse engineer the Grand Master Key that opens all locks in the system.
E N D