Skip to main content

Week 12

 Data security means protecting digital data, such as those in a database, from destructive forces and from the unwanted actions of unauthorized users, such as a cyberattack or a data breach. 

 

Software-based security solutions encrypt the data to protect it from theft. However, a malicious program or a hacker could corrupt the data to make it unrecoverable, making the system unusable. Hardware-based security solutions prevent reading and writing access to data, which provides strong protection against tampering and unauthorized access. 

Hardware-based security or assisted computer security offers an alternative to software-only computer security. Security tokens such as those using PKCS#11, or a mobile phone may be more secure due to the physical access required to be compromised. Access is enabled only when the token is connected, and the correct PIN is entered (two-factor authentication). However, dongles can be used by anyone who can gain physical access to them. Newer technologies in hardware-based security solve this problem by offering full proof of security for data. 

Working off hardware-based security: A hardware device allows a user to log in and log out through manual actions. The device uses biometric technology to prevent malicious users from logging in, logging out, and changing privilege levels. The current state of a user of the device is read by controllers in peripheral devices such as hard disks. Illegal access by a malicious user or a malicious program is interrupted based on the current state of a user by hard disk and DVD controllers making illegal access to data impossible. Hardware-based access control is more secure than the protection provided by the operating systems as operating systems are vulnerable to malicious attacks by viruses and hackers. The data on hard disks can be corrupted after malicious access is obtained. With hardware-based protection, the software cannot manipulate the user privilege levels. A hacker or a malicious program cannot gain access to secure data protected by hardware or perform unauthorized privileged operations. This assumption is broken only if the hardware itself is malicious or contains a backdoor. The hardware protects the operating system image and file system privileges from being tampered with. Therefore, a completely secure system can be created using a combination of hardware-based security and secure system administration policies. 


 Wrap-up


I enjoyed the experience of writing a blog and doing research about the topic and the body of the blog, it enabled me to read and learn more about the weekly chapter I needed to read. Writing a blog is helpful because it pushes me to study and read materials from my textbook to design a blog. 

I think I do see myself blogging in the future if it is not required for an assignment and if I have the time to do so. I am not sure blogging is desirable to most employers because I have yet to see it in a job description, but I hope it is the case. 

Comments

Popular posts from this blog

System Hardening Week 9

  Assume Breach and Be Proactive: Traditional cybersecurity is reactive, responding to known attack methods. However, sophisticated adversaries continuously evolve their tactics to bypass security solutions. Threat hunting operates under an “assume breach” mindset. It seeks to uncover indications of attack (IOA) that haven’t been detected yet. The goal is to outthink the attacker by identifying and mitigating threats before they access sensitive data.

Week 7 Cloud Computing.

  Cloud Computing vs. Internet of Things (IoT) Cloud Computing Cloud computing refers to the delivery of computing services (such as servers, storage, databases, networking, software, and analytics) over the internet ("the cloud"). Key characteristics include: ·          On-Demand Resources : Users can access resources as needed without physical hardware. ·          Scalability : Easily scale resources up or down based on demand. ·          Cost-Effectiveness : Pay-as-you-go pricing models reduce the need for significant upfront investments in hardware. ·          Accessibility : Access services from anywhere with an internet connection. Internet of Things (IoT) The Internet of Things (IoT) is a network of interconnected devices that collect and exchange data. These devices can include anything from smart home appliances t...

week 10 Cloud Computing.

  File Storage Description: Structure: Hierarchical, using directories and subdirectories. Data Organization: Files are stored with metadata like filename, timestamps, and permissions. Advantages: Familiarity: Easy for users to understand and manage, akin to traditional file systems. Ideal Use Cases: Great for storing and managing documents, media files, and shared drives. Block Storage Description: Structure: Data is divided into fixed-sized blocks. Data Organization: Each block has a unique identifier, but no metadata is attached directly. Advantages: Performance: High performance and low latency. Flexibility: The operating system can be formatted and used as required. Ideal Use Cases: Databases: Suitable for database applications. Virtual Machines: Commonly used for VM storage and high-performance applications.