What is Hardware Security?

Hardware Security

To know about the hardware security, lets first understand what all is covered under hardware security here :

  • Mobile Device Security (MDS)
  • IoT Security
  • Vulnerable Device Lists
  • Physical Security
  • Drone and Vehicles
  • SCADA
  • BIOS and UEFI
  • Self Encryption Device
  • Hardware Security Module

Mobile Device Security (MDS)

As we first insert a SIM (Subscriber Identity Module) in our mobiles there is a pop up message on our mobile which asks for a SIM pin which acts a SIM locking mechanism and protect ones information which could be of SMS text messages, contact lists , subscribers information etc.

IoT Security

To know about the IoT security, please check our previous blog, click here.

Physical Security

Lockdown cables for laptops, computers or making secure to the servers . There is also locked server room racks.

Drones and Vehicles

Drones are considered to be an normal aircrafts fitted with the cameras. The firmware in a drone has geo-fencing software. There are vehicles which have internal networks. There are crucial functioning of a vehicle which is called “Controller Area Network (CAN)”.

SCADA

This stands for Supervisory Control and Data Acquisition, which is used to control industrial processes such as as with manufacturing or critical infrastructure like water, electricity, oil refineries which consists of both hardware and software to make all this happen. There are some protocols which also works with it like DN3P, T101 etc.

BIOS and UEFI

A web page labeled “BIOS Simulator Center” : opens in a web browser. It contain a sample simulator labelled”Lenovo BIOS Setup Utility”. It is divided into two parts i.e. menu bar and Content pane.

Self Encrypting Drivers

This provides protection at the hardware level for the data stored on a drive, if the drive or the device housing the drive is lost or stolen and depending on the configuration of the self encrypting drive, it might not require any user interaction after it’s configured.

Hardware Security Module (HSM)

It provides protection and storage for cryptographic secrets at the hardware or firmware level and supports hardware crypto processing. HSM are FIPS 140-2 compliant which means that they are compliant with US government security standards for cryptographic modules.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | WordPress: www.doctoolss.wordpress.com | Website: www.doctoolss.com| Tumblr: https://www.tumblr.com/blog/doctoolss | Medium: https://medium.com/@doctoolss| Facebook: https://www.facebook.com/DTdoctoolss/  | Linkedin: https://www.linkedin.com/in/doc-tools-a302311a9/

What is PKI?

Public Key Infrastructure

Questions on your mind?

We often read about PKI over the net or on the cybersecurity columns even though we know its full form i.e. Public Key Infrastructure.

What is the relation PKI has with CA certificates and how all these are interlinked what key are we talking about, why only keys, not locks??

To answer all these questions we have written this blog in simple terms we will be able to make you understand about PKI.

Answers !!

PKI is the framework of encryption and cybersecurity that protects communication between server (your website) and the client (the users).

There are two keys by which PKI is working from:

  • Public Key
  • Private Key

The public key is available to any user that connects with the website.

The private key is a unique key generated when a connection is made, and it is kept secret.

How it Works?

When communicating, the client uses the public key to encrypt and decrypt, and the server uses the private key. This protects the user’s information from theft or tampering.

There are several elements in PKI one of them is a  Certificate Authority (CA) which is used to authenticate the digital identities of the users, which can range from individuals to computer systems to servers.  

The second component is Registration Authority (RA), which is authorized by the Certificate Authority to provide digital certificates to users on a case-by-case basis.

For more information, check out our earlier blog on CA and other certificates, click here.

For information on best practices with PKI , connect with the undersigned.

We Make Technology eazy via Docs

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | WordPress: www.doctoolss.wordpress.com | Website: www.doctoolss.com| Tumblr: https://www.tumblr.com/blog/doctoolss | Medium: https://medium.com/@doctoolss| Facebook: https://www.facebook.com/DTdoctoolss/  | Linkedin: https://www.linkedin.com/in/doc-tools-a302311a9/

Website Built with WordPress.com.

Up ↑

Create your website with WordPress.com
Get started