Excerpt From SECDEF Memo – Impacts on SCIF/SAPF Security Webinar
Watch the Video Below to Learn About the Data Exfiltration Use Case
CTO Dr. Brett Walkenhorst illustrates a scenario where an insider attempts to extract classified files from a secure facility. The insider enters the building with a hotspot and a Wi-Fi dongle in order to connect and steal information over the cellular network. To get around detection sensors, they turn off the equipment. Once inside, they initiate the hotspot, link the dongle to a protected PC, and move the data. The insider can destroy the equipment to reduce the possibility of being discovered departing the building. Learn more about this explanation in the clip below.
Emerging Tech: Security — The Need for Wireless Airspace Defense
Download now