In summary, threats can include malicious technical
attacks, which can include
external attempts to compromise systems through methods such as Distributed Denial of Service (DDoS)
attacks, malware propagation (such as Trojan horses) or
physical hacking attempts.
One of the unique and underlying security features of the GDPR compliant diskAshur 2 is the dedicated hardware based secure microprocessor (Common Criteria EAL4 + ready), which employs built - in
physical protection mechanisms designed to defend against
external tamper, bypass
attacks and more.