Chapter 14. Protecting systems against intrusive USB devices