Friday 29 January 2021

Hardware self-encryption or software encryption can provide confidentiality

 Either hardware self-encryption or software encryption can provide confidentiality. Intel Boot Guard can check the initial integrity of the boot code, and the board can enable authentication software to execute. Additional code monitoring ensures that no changes occur. Curtiss-Wright supplies sanitization routines and a certificate of volatility with its products that detail how non-volatile memories can be erased.

Security-centric embedded operating systems can provide additional controls, such as audit capability (AU family). The INTEGRITY-178 tuMP high-assurance real-time operating system (RTOS) from Green Hills Software in Palm Harbor, Fla., has taken part in national security systems such as those containing cross-domain solutions (CDS).

Earlier versions of information technology vs computer science passed evaluation by the National Security Agency (NSA) for systems requiring high robustness, and that evaluation included penetration testing. Security life cycle data is available for INTEGRITY-178 tuMP to support customer security certification efforts.


No comments:

Post a Comment