This week I'd like you to explore how emanations from computers or mobile devices can pose a threat to an organization. As part of your posting, I'd like you to do the following: 1) Identify how an ad

1. Emanations can be used by adversaries to eavesdrop on things like sound waves or light from computer hardware which can lead to valuable information being stolen. This is a cyber-security problem because it is a type of eavesdropping attack and it can be defended against.

2. This type of attack is very constrained due to the analogue data the attackers are dealing with. If the attackers are utilizing advanced methods, they can do things like take refracted light to learn what someone is viewing but that is very challenging. Most of these attacks will be simple things like watching someone type their password.

3. Most of these types of attacks can be defended against by making sure that people outside of the office space cannot properly view inside the office to eavesdrop on the workers. Ensuring that people outside of the vicinity cannot see proper lighting and movements will prevent these emanation attacks.

4. Emanations attacks have been used in three different types of breaches. These include image reconstruction attacks, LED attacks, and keyboard attacks which each have a different type of emanation that they focus on in order to steal data. 

Write 100 words Response/Comment: