Hardware Security

Get Started. It's Free
or sign up with your email address
Rocket clouds
Hardware Security by Mind Map: Hardware Security

1. Administrative Controls

1.1. Fire Safety Factors

1.2. Interception of Data Protection

1.3. Mobile and Portable Device Control

1.4. Visitor Control

2. Hardware Device Overview

2.1. Input

2.1.1. Mouse

2.1.2. Keyboard

2.1.3. Readers

2.1.3.1. Barcode

2.1.3.2. Biometrics

2.1.3.2.1. Voice Recognition

2.1.3.2.2. Fingerprint

2.1.3.2.3. Facial

2.1.3.2.4. Hand

2.1.3.2.5. Iris

2.1.3.2.6. Retina

2.1.3.3. Card

2.1.4. Touch screen

2.2. Output

2.2.1. Visual Display Unit

2.2.2. Printers

2.2.3. Speech Output

2.3. Storage

2.3.1. Harddisk

2.3.2. USB

2.3.3. SSD

3. Vulnerabilities

3.1. Theft

3.2. Human Intervention

3.2.1. Sabotage

3.2.2. Vandalism

3.2.3. Strikes

3.2.4. Intrusion

3.3. Disaster

3.3.1. Flood

3.3.2. Earthquake

3.3.3. Fire

3.3.4. Power Failure

3.4. Emergencies

3.4.1. Smoke

3.4.2. Building Collapse

3.4.3. Explosion

3.4.4. Water Leak

4. Aim

4.1. protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users

5. What?

5.1. measures taken to protect the physical environment and infrastructure that is housing the information system resources

6. IT Security?

6.1. Definition

6.1.1. protection of computer systems from the theft and damage to their hardware, software or information, as well as from disruption or misdirection of the services they provide.

6.2. Why?

6.2.1. to protect the business information value is the primary reason for information security

7. Prevention

7.1. Biometrics

7.1.1. Advantages

7.1.1.1. No Password

7.1.1.2. No Need ID Card

7.1.1.3. No Impersonation of Identity

7.1.1.4. Traits Cannot be Stolen or Duplicated

7.1.1.5. Hard to Break

7.1.1.6. Good Accuracy

7.1.1.7. Low Cost

7.2. ID Card and Badges

7.3. Photo ID Card

7.4. Magnetic Access Card

7.5. Locks and Keys

7.6. Electronic Monitoring and Surveillance Cameras

7.7. Alarms and Alarm Systems

7.8. Hardware Secure Module (HSM)

8. Impact

8.1. Financial Damage

8.2. Information Loss

8.3. Trust

8.4. Data Misused or Exploited

8.5. Business Agility

9. How?

9.1. necessary to consider vulnerabilities existing from its manufacture as well as other potential sources such as running code and the device’s data I/O on a network

10. Implementation

10.1. Hardware Secure Module (HSM)

10.1.1. What?

10.1.1.1. physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing

10.1.2. Critical Function

10.1.2.1. Encryption

10.1.2.2. Decryption

10.1.2.3. Authentication

11. Why?

11.1. Multi-tasking

11.2. Faster and more effective

11.3. Easy to evaluate but hard to predict

12. Involve

12.1. Hardware design

12.2. Access control

12.3. Secure multi-party computation

12.4. Secure key storage

12.5. Ensuring code authenticity