Hardware & System Infrastructure
Processor States
-
Single State Processors:ProcessorsDefinition:Multi-State Processors that
canonlyoperateatProcessors arestrictedsingleto one security level atany givena time.Example: A system dedicated to processing only confidential-level data, without the capability to handle data of different security levels simultaneously.Multi-State Processors:Definition:Processors capable of handlingmanaging data at multiple security levels simultaneously.
A system exclusively processing confidential data, unable to handle different security levels concurrently. Example:A military system that simultaneously processesprocessing top-secret, secret, and unclassifieddata,dataensuringconcurrentlythatwhile maintaining isolation and security for eachdatalevel.levelremainsisolated and secure. -
Multitasking:Multitasking Multiprocessing Definition:Multiprogramming Allows
Multithreading fortheconcurrentexecutionConcurrently ofrunning multiple applicationson a computer,with the operating systemmanaginghandling task switching.Running - multiple
Example:threads within a single program to enhance responsiveness and performance.Utilizing multiple processors or cores to enhance computing power and performance. Allowing multiple programs or tasks to share system resources, commonly on mainframe systems. E.g. Listening to music while browsing the web on a personal computer. Multithreading:Definition: Enables multiple concurrent tasks (threads) to run within a single program or process, often improving responsiveness and performance.Example:E.g. A word processor mightwithhave one threadthreads for typing,another forauto-saving, andanother forspellchecking,checking.allE.g. runningDesktopconcurrently.computerMultiprocessing:Definition: Involves the use of multiple processors (or multiple cores withinwith asingle chip) in a system to enhance computing power and performance.- at
Example: Modern desktop computers often have multi-core CPUs (likequad-coreorCPUocta-core) that can processprocessing several taskssimultaneously.once.
E.g. Multiprogramming:Definition: A technique resembling multitasking, primarily associated with mainframe systems, wherein multiple programs or tasks share the system's resources. Requires specialized programming to manage the tasks efficiently.Example: A mainframeMainframe managingdifferentjobs like data processing, printing, and calculationsallsimultaneously.
at
once. Read-Only Memory (ROM)
:- Definition:
Definition:ANon-non-volatile memory with data that is permanently written during its manufacturing. - Characteristics: manufacturing process.
Characteristics:ItPermanentprovidesstorage;permanent storage, with contentsareingrained"burned in" atduring thefactory. - Programmable Read-Only Memory (PROM): This type of memory allows users to program it once after manufacturing.
- Erasable Programmable Read-Only Memory (EPROM): A memory chip that can be programmed and subsequently erased and reprogrammed via ultraviolet light.
- Ultraviolet Erasable PROM (UVEPROM): Characterized by a small window that exposes the chip, enabling erasure through UV light.
- Electrically Erasable PROM (EEPROM): This version can be erased by administering specific electrical voltages, facilitating more intricate data manipulation than what UVEPROM offers.
- Erasable Programmable Read-Only Memory (EPROM): A memory chip that can be programmed and subsequently erased and reprogrammed via ultraviolet light.
- Definition: This is the main volatile memory used for temporary storage when a computer operates. Its contents are lost when the device is powered off.
- Static RAM (SRAM):
UsesRelies on flip-flops to store each bit of data.
- Static RAM (SRAM):
- Dynamic RAM (DRAM):
UsesUtilizes capacitorstoforstore each bit ofstoring data bits andrequiresnecessitates periodic refreshing. Main volatile memory used for temporary storage while a computer is running. It loses its content when power is turned off.Types:Flash
MemoryProgrammable ROMs:-
Definition: Memory that can be programmed once by the user after manufacturing.
- Definition:
Definition:EvolvedAfrom EEPROM, flash memorychip that can be programmed, then later erased and reprogrammed using ultraviolet light. Types:Ultraviolet Erasable PROM (UVEPROM): Features a small window that exposes the chip for erasure via UV light.Electrically Erasable PROM (EEPROM): Can be erased by applying specific electrical voltages, allowing for more selective data manipulation than UVEPROM.
-
Programmable Read-Only Memory (PROM):Erasable Programmable Read-Only Memory (EPROM):Flash Memory:Definition: A derivative of EEPROM; it'sis non-volatile andcanpermitsbeelectronicelectronically erasederasure andreprogrammed.- Characteristics:
Characteristics:DueCommonlyto its durability and swift access times, it's extensively used in USB drives, SSDs, and memorycardscards.due to its durability and quick access time. -
Primary Storage (Memory):
-
Definition: Directly accessible by the CPU. This is where the operating system, application software, and data in current use are kept so they can be quickly reached by the computer's processor.
-
Examples: RAM (both SRAM and DRAM).
-
Secondary Storage:
-
Magnetic: Hard disk drives (HDDs).
-
Flash: Solid-state drives (SSDs) and USB drives.
-
Optical: CDs, DVDs, Blu-ray discs.
-
-
Definition: Non-volatile storage mediums that store data until it is deleted or overwritten. Data from secondary storage needs to be loaded into primary storage before being processed.
-
Types:
-
Access Types:
-
Random Access: Storage devices where data can be read or written at any location at any time.
-
Sequential Access: Storage devices where data has to be read or written sequentially. Accessing specific data means going through the data stored before it.
-
Firmware is essentially specialized software stored on a ROM chip.
-
While ROM provides the foundational instructions to kickstart a device, firmware provides more specific instructions to ensure the device runs smoothly.
-
Apart from computers, firmware is commonly found in peripheral devices like printers to guide their operations.
-
Embedded Systems:
-
Motion systems (e.g., anti-lock braking system in cars)
-
Lighting systems
-
Cash registers
-
Digital signature pads
-
Wi-Fi routers
-
-
Definition: These systems are designed for a specific function or set of functions within a larger system.
-
Examples:
-
They're integral to many devices and can be found in everyday appliances as well as specialized equipment.
-
Static Environments:
-
Definition: Configurations like OSs, hardware, or networks set up for a particular purpose and remain unchanged despite interaction. They are resistant to alterations, even by authorized personnel like administrators.
-
Example: An industrial control system (like those used in manufacturing plants) that's configured to manage machinery operations. Changes could disrupt the production process, so the environment remains static to ensure consistent performance.
-
Management & Security:
-
Network Segmentation: Dividing network into various segments to keep critical systems separate and secure.
-
Security Layers: Using multiple security measures to protect systems, akin to having multiple barriers.
-
Application Firewalls: Protects against malicious inputs or attacks targeted at applications.
-
Manual Updates: Due to the sensitivity and specificity, updates might need to be manually reviewed and applied.
-
Firmware Version Control: Ensures only approved and tested firmware versions are in use.
-
Wrappers: Additional security layers around an application or system to shield it from potential threats.
-
Control Redundancy and Diversity: Having multiple controls in place, so if one fails, another can take over or compensate.
-
-
Both embedded systems and static environments, due to their specialized nature, require targeted security measures.
-
Security Measures:
- Its primary role is to enforce your security policy.
- TCB is a subset of the complete information system.
- Why? It's the only portion that can be relied upon to adhere to and enforce the security policy.
- It's an imaginary boundary.
- Separates the TCB from the rest of the system.
- Protects subjects (users) from the rest of the system.
- It's the logical part of the TCB.
- Confirms whether a subject has the right to access a resource before granting that access.
- Primary duty: Enforces access control.
- It's a collection of TCB components.
- Implements the functionality of the reference monitor.
MultiX Concepts
Memory
Random Access Memory (RAM):
Storage
Security Issues with Secondary Storage
Firmware
Embedded Systems & Static Environments
Remember: As technology evolves, the line between embedded systems and more flexible environments may blur, but the fundamental principles of securing these systems remain the same. Always prioritize the integrity and security of the system while accommodating for its intended function.
Trusted Computing Base (TCB)
:::information TCB is a combination of hardware, software, and controls. :::
:::success Only trust the TCB for policy enforcement. :::
Security Perimeter
:::warning Security perimeter acts as a barrier between TCB and the rest of the system. :::
Reference Monitor
:::quote "Does the subject have the right?" :::
Security Kernel
:::danger Security Kernel is vital; it IMPLEMENTS access control. :::