Skip main navigation

Physical Attacks: Specific USB Attacks

In this video, you will learn about USB devices that can be used in physical attacks against your network.
00:00
00:00

In this video, you will learn about USB devices that can be used in physical attacks against your network.

Hackers can use different devices that mimic common USB devices to gain access to your network, or they can alter a harmless USB device to allow it to be used for their malicious purposes. We review Key Croc and USB Ninja devices.

Reflect and share: How can you ensure that USB devices you add to your network are safe? Share your comments in the section below.

This article is from the free online

Advanced Cyber Security Training: Network Security

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now