LabVIEW

cancel
Showing results for 
Search instead for 
Did you mean: 

How to uniquely identify serial resources without relying on NI MAX aliases?

It's all about doing risk assessment in my field. Risk is the probability of an adverse event * the cost of said event. All high cost events (eg one such as this which violates underlying assumptions about hardware configuration) must be explicitly considered and mitigated, either through architecture, or through process.

 

So yes, while I agree the odds of this kind of attack are slim to none in the wild, we still need to think about ways in which our setup can fail, and handle them explicitly.

0 Kudos
Message 21 of 22
(240 Views)

@ijustlovemath wrote:

It's all about doing risk assessment in my field. Risk is the probability of an adverse event * the cost of said event. All high cost events (eg one such as this which violates underlying assumptions about hardware configuration) must be explicitly considered and mitigated, either through architecture, or through process.

 

So yes, while I agree the odds of this kind of attack are slim to none in the wild, we still need to think about ways in which our setup can fail, and handle them explicitly.


So, the 8-Ball WAS correct!  We are back to security.   

 

  • Risk < very low 
  • Consequences >= catastrophic 

Trained armed guards or other means of restricting UNTRAINED users from doing "stuff" to your computer in your laboratory are more effective than coding around your physical security needs.

 

The argument can be made that it is not the user, its the access!  

 

Document USER transactions and training. 


"Should be" isn't "Is" -Jay
0 Kudos
Message 22 of 22
(224 Views)