Mass Storage Media Locking By Curtis E. Stevens WD.

Slides:



Advertisements
Similar presentations
Computer-System Structures Er.Harsimran Singh
Advertisements

Hard Disk Drives Chapter 7.
COEN 252 Computer Forensics Hard Drive Geometry. Drive Geometry Basic Definitions: Track Sector Floppy.
Rambling on the Private Data Security
Flash storage memory and Design Trade offs for SSD performance
PC Card ATA command Extensions for Small Memory Card MEI(Panasonic), SanDisk,Toshiba Minoru Patrick Ohara(Toshiba)
Building Dependable Systems. R1. There is a single control button available for the user of the oven. If the oven is idle with the door closed and you.
The ATA/IDE Interface Can we write a character-mode device driver for the hard disk?
Protecting cells in the worksheet from being changed. June 21, 2012.
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
11 BACKING UP AND RESTORING DATA Chapter 4. Chapter 4: BACKING UP AND RESTORING DATA2 CHAPTER OVERVIEW Describe the various types of hardware used to.
Windows 8: Windows To Go Overview Zvezdan PavkovicTanya Koval Senior ConsultantArchitect WCL333.
Next Keep all food and drinks away from computer and equipment—liquid may spill and cause an electrical shock or the computer not to operate properly.
Object-Based Storage HPCC Lab. OBS Architecture OBSD  Storage components of the system to be shared  Disk drives, RAID subsystems, tape drives, optical.
OS2-1 Chapter 2 Computer System Structures. OS2-2 Outlines Computer System Operation I/O Structure Storage Structure Storage Hierarchy Hardware Protection.
Architectural Support for Operating Systems. Announcements Most office hours are finalized Assignments up every Wednesday, due next week CS 415 section.
Storage Networking Technologies and Virtualization Section 2 DAS and Introduction to SCSI1.
Computer Storage Devices Principles of Information Technology Lytle High School Click to continue.
15-Oct-2007 External Path Protection Discussion By Curtis E. Stevens.
Secondary Storage Unit 013: Systems Architecture Workbook: Secondary Storage 1G.
Gordon Hughes Feb T13 Change Request re Security Erase Gordon Hughes, UCSD Formerly Seagate (until 1997) PI.
Privilege Levels Cisco IOS provides for 16 different privilege levels ranging from 0 to 15. Cisco IOS comes with 2 predefined user levels. User mode.
Welcome to Networking! 1. Connect your computer to the network with a cable 2. Copy the Networking folder from the flash drive to the computer or your.
SHARKFEST '08 | Foothill College | March 31 - April 2, 2008 File and Disk Sharing Protocols April 2, 2008 Richard Sharpe Senior Software Engineer | Data.
The University of New Hampshire InterOperability Laboratory Serial ATA (SATA) Protocol Chapter 10 – Transport Layer.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 20 – The Hard Drive Interface.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 8 Understanding and Installing Hard Drives.
Linux+ Guide to Linux Certification, Third Edition
CompTIA Linux+ Certification
Internal components, Backing Storage, Operating Systems Software
Court IT Issues Windows XP Problem April 8, 2014 Microsoft Ends Security Updates April 9, 2014 XP Computers will contract an OS Infection as soon.
Storage Testing in DTM Eric St.John Software Design Engineer in Test Storageマイクロソフトディベロップメント株式会社部署名名前.
Learning Targets Identify the external parts of the computer Identify examples of input devices Identify examples of output devices Define basic computer.
AT91RM9200 Boot strategies This training module describes the boot strategies on the AT91RM9200 including the internal Boot ROM and the U-Boot program.
OPERATING SYSTEM OVERVIEW. Contents Basic hardware elements.
Hard Drive Overview: The UltraMax Plus, MiniMax and eGo Firewire+ Drives Erik Collett Chinese Product Launch IOMEGA CONFIDENTIAL.
Safety in the Classroom Presented by: Mrs. Evans.
Understanding and Troubleshooting Your PC. Chapter 5: Understanding, Installing, and Troubleshooting Disk Drives2 Chapter Objectives  In this chapter,
4 May I/O Control. 4 May What is I/O Control? A Doors feature that allows you to program input events to drive output responses – for example:
Please Note: Information contained in this document is considered LENOVO CONFIDENTIAL For Lenovo Internal Use Only Do Not Copy or Distribute!! For Lenovo.
Storage Devices Chapter 7. Floppy Drive Overview The floppy drive subsystem consists of three main parts: ▫the electronic circuits or the controller,
Keep all food and drinks away from computer and equipment Liquid may spill and cause an electrical shock or the computer not to operate properly.
SCSI Commands Overview
Lesson 3 — How a Computer Processes Data Unit 1 — Computer Basics.
Concerns about ATAPI devices using SATA bridges Mark Hartney Silicon Image August 19, 2003 T13 document e013131r0.
Floppy Disk Drive Chapter 5 Release 22/10/2010powered by dj.
Setting up/Managing Bank Personnel Intuit Financial Services University Business Financial Solutions Certification.
COEN 252 Computer Forensics Hard Drive Geometry. Drive Geometry Basic Definitions: Track Sector Floppy.
Enhanced Storage Architecture
CE Operating Systems Lecture 2 Low level hardware support for operating systems.
Hard Drives aka Hard Disk Drives Internal, External, and New Solid State Drives.
80386DX functional Block Diagram PIN Description Register set Flags Physical address space Data types.
Chapter 13 – I/O Systems (Pgs ). Devices  Two conflicting properties A. Growing uniformity in interfaces (both h/w and s/w): e.g., USB, TWAIN.
CE Operating Systems Lecture 2 Low level hardware support for operating systems.
Understand Encryption LESSON 2.5_A Security Fundamentals.
STRUCTURE OPERATING SYSTEMS. I. PROCESS MANAGEMENT Process a program in execution More than one process can be associated with a single program Each is.
Encryption as a Preventive Countermeasure Sean Maher, Information Security Coordinator.
Page 1 of 38 Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Please Note: Information contained in.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
T100 device encryption rework SOP. If user calls in for this issue (see last page for user scenarior), please guide user get through page 3 to 5 to disable.
AT91SAM7L Enhanced Embedded Flash Controller. ARM-Based Products Group 2 EEFC Features 64KB or 128KB single plane memory organized in several pages 128-bit.
WELCOME. Skills and Techniques - Session 2 Skills and Techniques Booting from Windows 8.1 and Windows 10 devices.
T100 device encryption rework SOP. If user calls in for this issue, please guide user get through page 3 to 5 to disable security boot. Please provide.
Boot Engineering Extension Record (B.E.E.R.) By Curtis E. Stevens.
COMPUTER SAFETY AND CARE
ITwin iTwin Presented by: G.Vyshnavi 14A81A0572 CSE-B.
Chapter 2: System Structures
11.1 Interrupt Mechanism, Type, and Priority
Operating Systems: A Modern Perspective, Chapter 3
Building Dependable Systems
Presentation transcript:

Mass Storage Media Locking By Curtis E. Stevens WD

Agenda The Problem ATA Security OS Detction Possible Approaches

The Problem Small or externally attached devices can be lost or stolen –USB –1394 –SATA –PATA –CFA Many of these devices accept SCSI CDB’s as their primary commands

ATA Security ATA Security was introduced in ATA/ATAPI-4 in 1997 and has been developed over a period of 7 years Provides the ability to password lock a device Provides a mechanism to erase the media and the passwords in the normal security mode Can turn the drive into a brick if passwords are lost in the high security mode.

Commands Security Disable Password –Turns off the password subsystem Security Erase Prepare –Security Erase is a 2 step process Security Erase Unit –Erase the media and as a last dying act, erase the passwords Security Freeze Lock –Prevent changes until the next power cycle Security Set Password –Enable the password subsystem Security Unlock –Open a password protected drive.

ATA Security Prevents the average user from gaining access to the data Protects the device, not the data Has been in use and tested for several years Implementation is light and well understood Other more complex methods are still being developed, but ATA style security can be implemented now.

OS Detection Some existing operating system standard drivers do not assign a drive letter if they are unable to read the media A locked device needs to be understood as locked –If the operating system does not have the capability to unlock the device it should prompt the user for a driver Detection is probably going to be bus specific

Proposal #1 Use the SAT ATA pass through mechanism or create a new SCSI CDB that enables the 6 ATA security commands Use Inquiry byte 1 bit 0 to indicate that a device is locked Define a security mode page to indicate that security is implemented and the current status of the drive

Proposal #2 Define a mode page for locking and unlocking Change write same to clear password where appropriate –Require Mode Select prior to write same –Use byte 1/10 bits 3 or 4 to indicate security erase.