Hardware & System Infrastructure

Processor States

Single State Processors Multi-State Processors
Processors restricted to one security level at a time. Processors capable of managing data at multiple security levels simultaneously.
A system exclusively processing confidential data, unable to handle different security levels concurrently. A military system processing top-secret, secret, and unclassified data concurrently while maintaining isolation and security for each level.

MultiX Concepts

Multitasking Multithreading Multiprocessing Multiprogramming
Concurrently running multiple applications with the operating system handling task switching. Running multiple threads within a single program to enhance responsiveness and performance. Utilizing multiple processors or cores to enhance computing power and performance. Allowing multiple programs or tasks to share system resources, commonly on mainframe systems.
E.g. Listening to music while browsing the web on a personal computer. E.g. A word processor with threads for typing, auto-saving, and spell checking. E.g. Desktop computer with a quad-core CPU processing several tasks at once. E.g. Mainframe managing jobs like data processing, printing, and calculations simultaneously.

Memory

Read-Only Memory (ROM)


Random Access Memory (RAM)
Flash Memory

Storage

  1. Primary Storage (Memory):
  • Secondary Storage:
    • Magnetic: Hard disk drives (HDDs).
    • Flash: Solid-state drives (SSDs) and USB drives.
    • Optical: CDs, DVDs, Blu-ray discs.
  • Access Types:
  • Security Issues with Secondary Storage

    1. Unauthorized Data Extraction with Removable Media:
      • Implementing policies to restrict the use of removable media.
      • Deploying Data Loss Prevention (DLP) solutions to monitor and control data transfers.
  • Inadequate Protection Mechanisms:
    • Applying file and disk encryption.
    • Implementing robust access control policies.
  • Data Persistence after Deletion or Formatting:
    • Employing secure deletion tools that overwrite data multiple times.
    • Physical destruction of storage for highly sensitive data.
  • Eavesdropping and Tapping on I/O Devices:
    • Using secure connections and protocols.
    • Regularly inspecting physical devices and connections for tampering, such as unexpected or unauthorized vampire taps.
    • Employing network monitoring tools to detect unusual data transfers or connections.
  • Firmware


    Embedded Systems & Static Environments

    1. Embedded Systems:
      • Motion systems (e.g., anti-lock braking system in cars)
      • Lighting systems
      • Cash registers
      • Digital signature pads
      • Wi-Fi routers
  • Static Environments:
  • Management & Security:
    • Network Segmentation: Dividing network into various segments to keep critical systems separate and secure.
    • Security Layers: Using multiple security measures to protect systems, akin to having multiple barriers.
    • Application Firewalls: Protects against malicious inputs or attacks targeted at applications.
    • Manual Updates: Due to the sensitivity and specificity, updates might need to be manually reviewed and applied.
    • Firmware Version Control: Ensures only approved and tested firmware versions are in use.
    • Wrappers: Additional security layers around an application or system to shield it from potential threats.
    • Control Redundancy and Diversity: Having multiple controls in place, so if one fails, another can take over or compensate.
  • Remember: As technology evolves, the line between embedded systems and more flexible environments may blur, but the fundamental principles of securing these systems remain the same. Always prioritize the integrity and security of the system while accommodating for its intended function.

    Trusted Computing Base (TCB)

    :::information TCB is a combination of hardware, software, and controls. :::

    :::success Only trust the TCB for policy enforcement. :::

    Security Perimeter

    :::warning Security perimeter acts as a barrier between TCB and the rest of the system. :::

    Reference Monitor

    :::quote "Does the subject have the right?" :::

    Security Kernel

    :::danger Security Kernel is vital; it IMPLEMENTS access control. :::


    Revision #4
    Created 21 August 2023 07:29:26 by Jack Waterhouse
    Updated 5 September 2023 04:19:16 by Jack Waterhouse