Sovi.AI - AI Math Tutor

Scan to solve math questions

QUESTION IMAGE

review the excerpt from the code book. if eve parks a van outside alice…

Question

review the excerpt from the code book. if eve parks a van outside alices house, she can use sensitive tempest equipment to identify each individual keystroke that alice makes on her computer. this would allow eve to intercept the message as it is typed into the computer, before it is encrypted. to defend against tempest attacks, companies are already supplying shielding material that can be used to line the walls of a room to prevent the escape of electromagnetic signals. in this excerpt, the author explains how computer security can be broken. why keyboards are unsanitary. how friends share secret messages. why computers are easily stolen.

Explanation:

Brief Explanations

The excerpt describes how Eve can use tempest equipment to intercept keystrokes before encryption, and how companies supply shielding material to counter such attacks. This focuses on computer - security vulnerabilities.

Answer:

how computer security can be broken.