Abstract:
This report talks about hardware cybersecurity, which is often overlooked as most cybersecurity issues are usually found in the software. The article lists what sort of attacks stemming from the hardware domain can ensue. It then lists how these attacks can occur - who the perpetrators might be - and the solutions such as deterrence tactics that should exist.
The article is a wonderful way of exploring something that many generally do not talk about - hardware. It admits that such an attack is difficult to carry out, but in the event it does, it would highly dangerous to the national security.