Researchers have demonstrated that an enemy can add data into the air-gapped systems and regain the data without extra hardware at the attacked device. This hidden optical connection uses light-emitting diodes already built into office equipment, for example, to display status messages on a printer or phone. Light-emitting diodes (LEDs) can receive light, although not designed.
You can create a hidden communication channel in both directions by directing laser light on pre-installed LEDs and recording their responses. This visual attack is possible in commercially available office equipment companies, universities and authorities.
Therefore, it is essential to protect critical IT systems optically in addition to traditional information and communication technology.
When a company, group, or organization communicates through the Internet, e-mail, or the like and collects and transmits data and information, it is vital to ensure the security of its information technology. Unfortunately, the rate of cyberattacks is increasingly destructive, and the risk of falling victim to cyber-attacks is increasing day by day. However, IT security can protect against the growing threat of cybercrime.
Information technology security is the protection of information, especially information processing. IT security aims to prevent data and system alterations by unauthorized third parties. The implication is that social and technological systems, i.e., people and technology, companies/institutions and their data, physical data centers, cloud services, are protected from harm and danger.