Get premium privacy for less: 2 years + 4 months at a special price.

Get 2 years + 4 months at a special price. Claim now!

Claim Now!

Expressvpn Glossary

Peripheral device

Peripheral device

What is a peripheral device?

A peripheral device is a hardware component that expands a computer’s functionality. Many peripherals are external, though some may also be installed internally. Common functions include inputting information, outputting results, and storing data, but the device itself is not essential for the computer to operate.

In practice, though, most users need at least one input method and one output method to actually use a computer, whether through physical peripherals or remote access tools.

How does a peripheral device work?

Peripherals rely on hardware connections and software to function. The device first connects via a port or wireless link, such as a Bluetooth mouse pairing with a laptop. It then draws power from a data cable, an internal battery, or a wall outlet for larger devices like printers.

Many peripherals also run firmware, which is low-level software that controls the device’s internal hardware and can sometimes be updated to fix bugs or add features.

Once the peripheral is connected and powered, the computer’s operating system communicates with it through a driver or a built-in device class driver.

From there, the device and the computer exchange data using standard communication protocols, so inputs such as mouse clicks are registered immediately.Table listing connection types, risks, and mitigations for keyboards, printers, webcams, USB drives, and network dongles.

Types of peripheral devices

Peripherals can be categorized as:

  • Input devices: Send user commands or real-world data to the computer. Examples include keyboards, mice, scanners, and microphones.
  • Output devices: Receive data from the computer and present it to the user. Examples include monitors, speakers, printers, and projectors.
  • Storage devices: Store data separately from the computer’s internal storage. Examples include external hard drives, USB flash drives, and SD cards.
  • Networking devices: Enable the computer to communicate with other systems or connect to a network. Examples include Wi-Fi adapters, modems, Ethernet adapters, and Bluetooth dongles.
  • Mixed devices: Handle both input and output. Examples include touchscreens (display and touch input), headsets (audio output and microphone input), and virtual reality headsets (display and motion tracking).

Why are peripheral devices important?

Peripheral devices serve several purposes:

  • Customization: Users can upgrade specific features to fit their needs and preferences. For example, they might add a high-quality webcam for streaming or an external keyboard with quieter keystrokes.
  • Accessibility: Specialized peripherals such as trackballs, Braille displays, and foot pedals can help people with different disabilities to operate computers effectively.
  • Ergonomics: External peripherals help laptop users create a more comfortable workspace by allowing them to position screens, keyboards, and pointing devices at optimal angles, which can help reduce strain.
  • Data portability: External storage devices allow users to physically transport large amounts of data between disconnected systems or create offline backups.

Risks and privacy concerns

Peripherals are useful, but they’re not risk-free. These are the main security and privacy vulnerabilities to keep in mind:

  • Additional points of entry: Wireless peripherals communicate with computers via radio signals. If those connections are not securely paired and encrypted, attackers within range may intercept signals or inject their own commands.
  • Malicious devices: Some USB devices are physically modified to impersonate trusted hardware. BadUSB-style attacks, for example, can make a device appear to be a keyboard and automatically issue malicious commands when it's plugged in.
  • Driver flaws: Peripherals rely on driver software to communicate with the operating system. Outdated or poorly written drivers may contain vulnerabilities that attackers can exploit to gain unauthorized access or elevate privileges.
  • Firmware tampering: Attackers can embed malicious code directly into a peripheral's firmware, the low-level software that controls the device's basic functions. Because firmware sits below the operating system, this type of threat can persist even after a system wipe and reinstall.

Further reading

FAQ

Is a USB flash drive a peripheral device?

Yes. A USB flash drive is considered a storage peripheral. It connects externally to the system to provide additional data storage.

Why are USB peripherals considered risky?

USB peripherals can be risky because a malicious device may impersonate a trusted hardware type, such as a keyboard, and send commands to the computer. A removable drive can also carry malicious files, even though classic USB AutoRun is not the default behavior on modern Windows systems.

How do I reduce security risks from peripherals?

You can reduce security risks from peripherals by removing unnecessary devices, keeping drivers up to date, disabling AutoRun or limiting AutoPlay behavior on external drives where appropriate, and using USB data blockers when charging devices from public USB ports.

What’s the difference between internal and peripheral hardware?

Internal hardware sits inside the case and includes core components needed for processing and storage. Peripheral hardware is typically external and auxiliary; the computer can usually run without it, even if it becomes difficult to use in practice.
Get Started