Physical Theft
Having physical access to a computer system allows an adversary to bypass most security
protections put in place to prevent unauthorized access. By stealing a computer system, the
adversary has all the physical access he could want, and unless the sensitive data on the