-
Peripherals
- A device which has no direct effect on a device's performance, but may be used to provide input and/or receive output.
-
Three categories of peripheral devices exist:
- Input Peripherals
- Output Peripherals
- Input/Output Peripherals
-
Wireless Peripherals
- In most cases, wireless peripherals connect using Bluetooth or Wi-Fi.
- When using a wireless peripheral, follow the same wireless security precautions that you would for any other device.
- Make sure that the device is authenticated to the network and using a secure, encrypted connection to protect against eavesdropping.
-
Examples:
- Wireless Keyboards
- Wireless Mice
-
Printers/MFDs
-
Multi-Function Device (MFD):
- Printer/Scanner/Copier Combo
- Modern printers are fully-functioning computers that often run Windows or Linux OS. They need to be patched when vulnerabilities arise.
- Printers may contain web servers that can be vulnerable if precautions are not taken, and should be carefully secured.
- Printer network traffic is vulnerable to eavesdropping. To protect printer traffic from eavesdropping, use TLS encryption.
- Printers may retain remnant data from print jobs on their internal hard discs. When disposing of a printer, be sure that its memory is securely wiped to prevent accidental data disclosure.
-
Storage Devices
-
External Storage Devices
- External storage devices create an attack surface for insiders to perform data exfiltration.
-
Wi-Fi-Enabled MicroSD Cards
- A type of storage device that allows owners to create their own Wi-Fi networks. This may allow an individual to copy information to a storage device without physical access.
-
Digital Cameras
- An example of this technology is found in the Wi-Fi-enabled microSD cards that are popular with digital camera users. These cards allow the copying of photos from a camera to a computer or even directly to a web service without removing the card from the camera.