Download presentation
Presentation is loading. Please wait.
Published byFay Perry Modified over 9 years ago
1
1 Hardware Security AbdelRahman abu_absah Teacher: Dr. Sanaa al_sayegh
2
2 * Overview –Define Hardware. –Hardware Security. –Attacks, Threats and Attackers. –Security Categories. –Hardware Security Modules (HSM).
3
3 Hardware: is a general term that refers to the physical artifacts of a technology. It may also mean the physical components of a computer system, in the form of computer hardware. Typical PC hardware: Motherboard, CPU, RAM, ROM, Power Supply, Removable media devices, Internal storage, Networking.
4
4 PC hardware
5
5 Computer Security Computer security can takes two forms: Software security. Hardware security.
6
6 Hardware Security Hardware security protects the machine and peripheral hardware from theft and from electronic intrusion and damage.
7
7 Hardware Security (continue) Fluctuations in the power supply can play havoc with computers. For example, a blackout or brownout can cause a computer to shut down abruptly. Information that is stored only in short-term memory will be lost. As well, the fluctuation can physically damage computer components. The use of a surge protector guards against electrical spikes and drops. An uninterruptible power supply (UPS) can also be hooked up to a computer. A UPS is essentially a battery that will power the computer in the event of a power outage. This can provide time for information to be saved and for a computer to be shut down correctly.
8
8 Attackers: –Class 0 – Script Kiddies –Class I – Clever Outsider –- Intelligent, limited knowledge of target –- Usually through a known weakness –Class II – Knowledgeable Insider –- High-tech expertise –- Advanced tools and instruments –Class III – Funded Organisation –- Specialists with lots of funding –- Most advanced tools and analysis
9
9 Attacks: –Insider Attack - e.g. Laid-off employee. –Invasive Attacks - e.g. Hardware reverse engineering – Semi-invasive Attacks - e.g. Heating – Non-Invasive Attacks - e.g. EM radiation observation
10
10 Security Categories: –Physical – Logical – Environmental – Operational
11
11 Security Categories: (continue) Physical Security: Tampering –“An (physical) interference of a harmful nature” –Tamper Mechanisms: Strive to prevent an attempt by an attacker to perform unauthorised physical or electronic action
12
12 Security Categories: (continue) Logical Security: – Access Control – Cryptographic Algorithms – Cryptographic Protocols
13
13 Security Categories: (continue) Environmental Security: – Device itself is the asset – Goal – limit attacker’s possibilities by creating layers of hindrance (e.g. access) – Administrative controls should be part of security policy
14
14 Security Categories: (continue) Operational Security: – Security risks related to operation of hardware. – Closely related to last week’s lecture. – Example: ATMs –User’s knowledge of: - Real vs. Fake card reader - Keypad operation - PIN Safeguarding - Latest attacks
15
15 Hardware Security Modules (HSM). A Hardware Security Module is a hardware-based security device that generates, stores and protects cryptographic keys. It provides the foundation for a high-level secure campus certification authority. Certification modules are also available in software, but a hardware device provides a higher level of security. Examples:
16
16 References http://www.answers.com/topic/computer- hardware-security http://www.cs.nott.ac.uk/~mvr/G53SEC/lectur e13_hardware.ppt http://www.cren.net/crenca/docs/hsm.pdf
17
17 Thank You
18
18 Quiz Define Hardware security ? Explain how can you protect your PC hardware from any damage?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.