Slide 1 Slide 2 Slide 3 Slide 4 Slide 5 Slide 6 Slide 7 Slide 8 Slide 9 Slide 10 Slide 11 Slide 12 Slide 13 Slide 14 Slide 15 Slide 16 Slide 17 Slide 18 Slide 19 Slide 20 Slide 21 Slide 22 Slide 23 Slide 24 Slide 25 Slide 26 Slide 27 Slide 28 Slide 29 Slide 30 Slide 31 Slide 32 Slide 33 Product List
Crypto Products Slide 3
Before discussing the examples and product overview, it is important to spend a few minutes talking about hardware security. In very simplistic terms, there are three kinds of security solutions: (1) Software only; (2) Hardware security on client-side only; and (3) Full hardware security on both host and client. It’s important to understand that software-only solutions are vulnerable to attack. This slide provides an example of an x-ray image of a hard disk drive. The patterned areas typically represent items such as documents and spreadsheets while the area in the middle, which exhibits a high level of randomness, shows where the keys are stored. A hacker could easily examine this and know where to look for the keys. This illustrates how secrets and confidential data stored by unsecured means, such as in standard EEPROMs or Flash memories, are vulnerable to attack and exposure.
PTM Published on: 2011-10-18