Describe the “Assets” that can be found in a SoC.
1. How can the entropy asset be exploited?
2. How can a scan-based attack be performed remotely? Show an example.
3. Explain the differences between semi-invasive and invasive attack.
4. Describe the capabilities of an “Insider” attacker. What kind of attacks can an “Insider” perform?