Sunday, September 22, 2019
Physical Tamper-Resistant Devices Essay Example | Topics and Well Written Essays - 750 words
Physical Tamper-Resistant Devices - Essay Example In this scenario, encryption keys are stored in a computer that can be vulnerable to abuse, use, or alter by an illegal user or an attacker. For various reasons one of the most important techniques to secure encryption keys is to store them in a more protected tamper resistant hardware system. These systems can be utilized for a wide variety of applications varying from protected online cash transfer to e-mail and credit card transactions. In fact, they provide physical safety to the encryption keys saved inside them, as a result making sure that these security keys have not been illegally modified or read. Naturally, attaining access to the information and data on tamper resistant device necessitates knowledge of a password (or PIN) that exactly what kind of system access can be attained using this information and data depends on the device (EMC Corporation., 2012; Anderson & Kuhn, 2000). There are different types of physical tamper-resistant devices and each device has different ch aracteristics. Basically, physical tamper-resistant devices are based on some kind of seals, locks, covers, coatings, and tamper response and detection mechanisms. According to FIPS 140 security levels there are basically four levels of physical security management standards. For the sake of application of a physical tamper-resistant system, the level 1 is about the implementation of some primary requirements on cryptographic algorithms. In this scenario, there are no such physical security devices at this level. The level 2 of the physical tamper-resistant system is based on the tamper evident seals or coating. While at level 3 we have an improved physical security system that can stop illegal access to systems and devices. The level 4 is based on extremely dependable tamper detection and response devices that can instantly erase the entire secret data (Anderson & Kuhn, 2000; NIST, 2001). In addition, the physical tamper-resistant can be of different types for example for the sake of devicesââ¬â¢ warranties and support management we have tamper evident seals. These seals can deal with a tempering of opening devices. Such seals are used to make sure that warranties and support services still be offered (ommerling & Kuhn, 1999). In addition, for the sake of technology based systems security management we make use of the tamper resistant microprocessors. Such microprocessors are utilized to store as well as process sensitive and private data and information. To stop security breaches and attacks from illegal source such chips make it difficult for the outsiders to get access to sources as well as make sure that these resources are accessed only by the embedded software. Another kind of tamper resistance devices is known as DRM. These devices can include set-top boxes, smart cards and other technology based systems which are utilized for the management of digital rights. Additionally, some software applications are also used for tamper resistance. However, the se systems are not similar to above discussed physical devices but have embedded instructions to lock the system after a specific number of illegal attempts or destroy the data as well (Anderson & Kuhn, 1997; ommerling & Kuhn, 1999). According to my point of view tamper resistant systems are similar to bank vaults. Such kinds of system are characterized through the outer device case design for solid access management scheme. Someone needs high level methods and tools to breach such security based system. However, some of the systems are tamper responding systems which are based on the idea of the burglar alarm method. Such kind of security mechanism is based on detection of some illegal activity or intrusion and notifying the responsible staff for such issues.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.