19 Further informationTroubleshootingIf you experience problems when installing or using the AdderView Secure unit,please check through this section for a possible solution. If your problem is notlisted here and you cannot resolve the issue, then please refer to the ‘Gettingassistance’ section.No video from computer• This is most likely to be associated with a mismatch between the hostcomputer’s video output and the DDC data held within the AdderViewSecure. Computers often need read the correct DDC data before they willoutput a video signal.Depending on your DDC connection policy (see Video display (EDID)information for details), remember that the AdderView Secure will onlyattempt to read the DDC data from your monitor when the AdderViewSecure is first powered on. To ensure that your monitor’s DDC data is readand stored correctly, ensure that it is attached and powered on when youswitch on the AdderView Secure.Summary of threats and solutionsThis section provides a list of potential security threats that the AdderViewSecure might face during operation and the special steps that have been takento counteract them.Threat SolutionMicroprocessormalfunction orunanticipated softwarebugs causing data to flowbetween ports.Unidirectional data flow is enforced byhardware “data diodes” so data isolationdoesn’t rely on software integrity.Subversive snoopingby means of detectingelectromagnetic radiationemitted from theequipment.Carefully shielded metal case with dualshielding in critical areas.Detection of signalson one computer bymonitoring for crosstalk(leakage) signals onanother computer.No connection to sensitive analogue inputs(such as computer microphone ports) areprovided. A very high level of crosstalkseparation is provided between signalsfrom different computers.Malicious modification ofmicroprocessor softwarecausing data to leakbetween ports.Data isolation is assured by hardware and sois not compromised by any changes to themicroprocessor software. Microprocessorsuse one time programmable memory soflash upgrades are not possible. Case usescounter-sunk screws which can be protectedby tamper-evident seals.Buffered data within akeyboard or mouse is sentto the wrong computerafter switchover.Keyboard and mouse are powered downand reset between each switchover toensure that all buffers are cleared out.Data leakage by meansof monitoring conductedemissions on mains power.The power circuitry provides strongprotection against signal leakage via thepower cable.