Protection against HID attacks
Authors:
Abstract:
The paper examines the relevance of HID attacks in order to gain access to protected information resources or take control over hardware and software and hardware as part of an automated workplace or peripheral equipment. Presented are devices for implementing devices for carrying out HID attacks in order to demonstrate their capabilities. Based on the results of considering the currently existing hardware and software implementations of HID devices, a comprehensive method proposed for ensuring the security of information systems and individual devices from the considered type of attacks