StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Physical Tamper-Resistant Devices - Essay Example

Cite this document
Summary
One of the basic goals behind the development of a secure and safe computer or information system is to make sure that a number of cryptographic keys can only be accessed and utilized by their intended users and simply for their proposed tasks…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.4% of users find it useful
Physical Tamper-Resistant Devices
Read Text Preview

Extract of sample "Physical Tamper-Resistant Devices"

Download file to see previous pages

In this scenario, encryption keys are stored in a computer that can be vulnerable to abuse, use, or alter by an illegal user or an attacker. For various reasons one of the most important techniques to secure encryption keys is to store them in a more protected tamper resistant hardware system. These systems can be utilized for a wide variety of applications varying from protected online cash transfer to e-mail and credit card transactions. In fact, they provide physical safety to the encryption keys saved inside them, as a result making sure that these security keys have not been illegally modified or read.

Naturally, attaining access to the information and data on tamper resistant device necessitates knowledge of a password (or PIN) that exactly what kind of system access can be attained using this information and data depends on the device (EMC Corporation., 2012; Anderson & Kuhn, 2000). There are different types of physical tamper-resistant devices and each device has different characteristics. Basically, physical tamper-resistant devices are based on some kind of seals, locks, covers, coatings, and tamper response and detection mechanisms.

According to FIPS 140 security levels there are basically four levels of physical security management standards. For the sake of application of a physical tamper-resistant system, the level 1 is about the implementation of some primary requirements on cryptographic algorithms. In this scenario, there are no such physical security devices at this level. The level 2 of the physical tamper-resistant system is based on the tamper evident seals or coating. While at level 3 we have an improved physical security system that can stop illegal access to systems and devices.

The level 4 is based on extremely dependable tamper detection and response devices that can instantly erase the entire secret data (Anderson & Kuhn, 2000; NIST, 2001). In addition, the physical tamper-resistant can be of different types for example for the sake of devices’ warranties and support management we have tamper evident seals. These seals can deal with a tempering of opening devices. Such seals are used to make sure that warranties and support services still be offered (ommerling & Kuhn, 1999).

In addition, for the sake of technology based systems security management we make use of the tamper resistant microprocessors. Such microprocessors are utilized to store as well as process sensitive and private data and information. To stop security breaches and attacks from illegal source such chips make it difficult for the outsiders to get access to sources as well as make sure that these resources are accessed only by the embedded software. Another kind of tamper resistance devices is known as DRM.

These devices can include set-top boxes, smart cards and other technology based systems which are utilized for the management of digital rights. Additionally, some software applications are also used for tamper resistance. However, these systems are not similar to above discussed physical devices but have embedded instructions to lock the system after a specific number of illegal attempts or destroy the data as well (Anderson & Kuhn, 1997; ommerling & Kuhn, 1999). According to my point of view tamper resistant systems are similar to bank vaults.

Such kinds of system are characterized through the outer device case design for solid access management scheme. Someone needs high level methods and tools to breach such security based system. However, some of the systems are tamper responding systems which are based on the idea of the burglar alarm method. Such kind of security mechanism is based on detection of some illegal activity or intrusion and notifying the responsible staff for such issues.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Physical Tamper-Resistant Devices Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Physical Tamper-Resistant Devices Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1455416-week
(Physical Tamper-Resistant Devices Essay Example | Topics and Well Written Essays - 750 Words)
Physical Tamper-Resistant Devices Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1455416-week.
“Physical Tamper-Resistant Devices Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1455416-week.
  • Cited: 0 times

CHECK THESE SAMPLES OF Physical Tamper-Resistant Devices

Hip Replacement

The implanted devices restore smooth articulation at the ends of the bones – the femur and pelvic bone – thus allowing normal movement to take place at the joint.... This paper shall discuss the details of the design and components of the hip arthroplasty, the important reasons for performing the procedure on patients, the physical and chemical properties that the implant must possess in order to satisfy functional requirements of the hip joint, and the future outlook for the procedure....
6 Pages (1500 words) Term Paper

Klebsiella Pneumonia

Patients who are at the highest risk of being infected by the Klebsiella bacteria are those that require medical care devices including intravenous (vein) catheters and ventilators or the breathing machines as well as those who are taking long courses of certain antibiotics.... It should be noted that the Klebsiella bacteria often affect those who need the assistance of medical devices and that is why the disease mainly affected the ICU patients....
8 Pages (2000 words) Case Study

Wind Load Effects on Skyscrapers

Tuned mass dampers are devices utilised by engineers and architects to ensure minimisation of the adverse effects of wind loading.... These devices are utilised in high-rise buildings reaching above 50 storeys.... The construction of skyscrapers involves numerous considerations for loading effects upon the building....
15 Pages (3750 words) Essay

Electrical circuits

Electronic components in electrical circuits include semiconductor devices diode, op amp and transistors.... Performing signal processing in the semiconductor devices is meant to get information about input signal like RMS, peak value, the relative phase and the amplitude envelope.... Nonlinear components are used in the feedback loop in examining the performance of diodes and op amp devices.... RLC response characteristics in different connection conditions have been put out expounding on the effects of loading and use of active and passive devices in electrical circuits....
15 Pages (3750 words) Lab Report

Health, Safety & Aviation Law

arious threats linked to air cargo safety comprise: carrying of explosive and incendiary devices; consignments of unrevealed or undetected dangerous materials aboard aircraft; cargo offense including theft and smuggling; and aircraft hijackings and disruption by persons with access to aircraft.... ther tools being well thought-out to improve air cargo safety includes tamper-resistant and tamper-evident packaging and containers; explosive detection methods and other cargo screening equipment; blast-resistant cargo containers; and biometric methods for employee identification and right of entry control....
19 Pages (4750 words) Essay

Project Goal and Design, Winding Resistance and Sensitivity

he design composes of a unit which is the physical magnitude, a measurement range which is the value the counter displays, transducer range which can detect minimal changes in the quantity and resolution which is related to the precision of the measurement.... The paper "Project Goal and Design, Winding Resistance and Sensitivity" highlights that the system can be improved by using wires with low internal resistance....
6 Pages (1500 words) Case Study

The Control Panel for Alarm Systems

Intruder sensors are devices used to detect any unauthorized motions and convert the disturbance due to this intrusion into signals that trigger an alarm system.... Intruder sensors are devices used to detect any unauthorized motions and convert the disturbance due to this intrusion into signals that trigger an alarm system.... Sensors Passive Infrared Sensors The passive infrared sensors (PIR) are pyroelectric devices that function by detecting changes in the infrared (radiant heat) from emitting bodies in its surrounding....
12 Pages (3000 words) Term Paper

The Information Security Risks of Using Mobile Apps for Individuals and Organizations

Additionally, mobile devices are highly exposed to security breaches as they still lack sophistication in the areas of secure anti-viruses, reliable configuration settings, as well as firmware updates.... Bluetooth and Wi-Fi connections also make mobile devices to be particularly vulnerable to attacks from malicious mobile apps.... By design, mobile devices are characteristically undersized, portable, and particularly lightweight (O'Leary et al....
6 Pages (1500 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us