76 - Physical Attacks
Use of a bait to attract victim, for example an USB drive or pair of keys
Collecting and analysing discarded items or scraps from a victim to gain information
Removal of sensitive data so that it can't be recovered at all
The destruction of the magnetic domains of a HDD plate using a degausser
Overwriting the data sectors with new information in patterns in cycles to ensure original information is replaced
Interception and recording, secretly, of what an user is typing, either software or hardware
The ability of an attacker to enter an area or access information by following someone that has the ability to access it