They includes mainframes, servers, desktops, UPS, mobile devices and firewalls.
Hardware risks arise from physical and logical contact.
Examples of these risks are as follows which I have separated into overt and surreptitious actions.
- Adjust hardware settings
- Theft of entire item or components like memory chips
- Spying (by attaching devices like keystroke loggers to capture information input to the computer)
- Crashing the system
- Access software and data for copying, deletion, alteration or transmission to another location
- Malicious code