Slide 1
Slide 2
Slide 3
Slide 4
Slide 5
Slide 6
Slide 7
Slide 8
Slide 9
Slide 10
Slide 11
Slide 12
Slide 13
Slide 14
Slide 15
Slide 16
Slide 17
Slide 18
Slide 19
Slide 20
Slide 21
Slide 22
Slide 23
Slide 24
Slide 25
Slide 26
Slide 27
Slide 28
Slide 29
Slide 30
Slide 31
Slide 32
Slide 33
Product List
Before discussing the examples and product overview, it is important to spend a few minutes talking about hardware security. In very simplistic terms, there are three kinds of security solutions: (1) Software only; (2) Hardware security on client-side only; and (3) Full hardware security on both host and client. It’s important to understand that software-only solutions are vulnerable to attack. This slide provides an example of an x-ray image of a hard disk drive. The patterned areas typically represent items such as documents and spreadsheets while the area in the middle, which exhibits a high level of randomness, shows where the keys are stored. A hacker could easily examine this and know where to look for the keys. This illustrates how secrets and confidential data stored by unsecured means, such as in standard EEPROMs or Flash memories, are vulnerable to attack and exposure.
PTM Published on: 2011-10-18