SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals
SEC595Cyber Defense

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsSecurity is always only as strong as its weakest link. While there do exist many guidelines to secure various operating systems, there is considerably less material available on how to secure the low-level components of a PC, although these can equally be compromised in order to obtain full control over a machine. First this paper gives an overview of the BIOS and its functions. Then known threats to the BIOS and the hardware of a PC are discussed in detail and how they could be exploited. Finally countermeasures are given that can mitigate the risks. |