Article count:1547 Read by:1783867

Account Entry

Achieve "good enough" security to keep hackers away: these network security suites are essential!

Latest update time:2021-12-15
    Reads:
Whether security is good enough really depends on what is being protected, the likelihood of being attacked, and the resources a company has in place when trying to protect its assets. Companies are slow to understand security threats. As the Internet of Things grows in popularity, the usefulness of devices has increased significantly, but so has the likelihood that they will be targeted. The threat of your car, home, or any online device being attacked is real.
To some extent, technologies can and do protect us from risk. The question is whether they can continue to do so. For example, if people think that "good enough" data security is good enough in the cloud computing era, this may not be the case when public cloud threats increase with the number of cloud service users.



Good enough ingredients


In an age where security breaches are commonplace for large companies, smaller companies are more vulnerable, even if they invest heavily in protection. Many businesses still do not consider cybersecurity as a mandatory measure to reduce potential threats. In almost all cases of security breaches, companies have established "good enough" controls and complied with industry regulations.

Goals and Trade-offs


An important question is, “What do you want to protect?” Ultimately, this defines your security goals. The trade-off involves risk management. How much you can spend, and how much you need to spend to protect what’s important to you. Remember, this means ongoing expenses.
Often, organizations don’t keep up with the pace of threats and don’t understand what constitutes a threat. Start by tracking incidents, leaked data, malware, devices used by employees, and what policies are in place to eliminate potential vulnerabilities. What measures are in place? For example, firewalls, mobile device gateways, VPNs, authentication methods, and encryption. How successful have the protection methods been to date and can they be quantified? If an attack has occurred, how did it happen? This threat intelligence can help prioritize and properly assess existing vulnerabilities. What is unsafe? How quickly and well can these issues be remediated?
When a breach does occur, resources must be allocated to respond to the threat, stop the attack, and clean up the results. What is truly at risk is the intellectual property, personal data, financial data, and trade secrets that are lost with only “good enough” protection.

Implement prevention and protection


Many vulnerabilities can be addressed relatively easily. In some cases, it involves specific detection methods or blocking access by implementing specific techniques. In other cases, certain vulnerabilities can be eliminated by preventing tampering or establishing links where information cannot be tampered with or altered.
Implementation of prevention methods can include technologies such as facial recognition and fingerprint verification. For example, Omron 's HVC-P2 facial recognition module provides two cameras, one for long-range detection and the other for wide-angle detection. These modules use Omron image recognition algorithms to determine the detection results of faces and bodies, and are good at estimating gender, age, expression and other facial features.


Figure 1: Omron camera modules provide facial recognition capabilities that go far beyond specific facial features. (Image source: Omron)

Devices embedded with the HVC-P2 will detect nearby users without the user being aware of the camera’s presence. In addition, using an off-the-shelf microcontroller and camera combination, developers can quickly add facial recognition to embedded systems.

Another solution is DFRobot 's SEN0188, a self-contained, Arduino-compatible fingerprint module. The module features a high-speed DSP and works with MSP430, AVR ® , PIC ® , STM32, Arm ® and FPGA devices. With the ability to store 1,000 fingerprints, the product supports fingerprint input, intelligent image processing, and fingerprint comparison and search modes.


Figure 2: DFRobot’s SEN0188 fingerprint module provides comparison, image processing, and fingerprint search modes. (Image source: DFRobot)

In the security space, Infineon 's Blockchain Security 2GO Starter Kit provides a quick and easy way to build best-in-class security into blockchain system designs. The kit provides an evaluation environment for a variety of blockchain technologies, includes five ready-to-use NFC cards, and supports basic blockchain functions such as secure key generation, password protection, and signing methods.

In short, blockchain is a decentralized digital ledger based on a chain of blocks, each of which is cryptographically linked to the previous block. Each transaction is protected by a digital signature. The Blockchain Security 2GO Starter Kit uses a hardware-based protection mechanism to securely generate and store private keys.

Maxim 's DS28C40 Anti-Tamper and Secure Interface Evaluation Board Provides the required hardware and software to evaluate the DS28C40 secure authenticator. The device provides a core set of cryptographic tools derived from integrated asymmetric and symmetric security functions. In addition to the security services provided by the hardware cryptographic engine, the device also integrates a FIPS/NIST true random number generator, one-time programmable memory for user data, keys, and certificates, a configurable GPIO, and a unique 64-bit ROM identification number.


Figure 3: Maxim’s DS28C40 secure authenticator evaluation board provides developers with a core set of cryptographic tools. (Image source: Maxim Integrated)

The DS28C40's DeepCover embedded security feature provides multiple layers of advanced security protection for sensitive data, enabling strong secure key storage. To defend against device-level security attacks, the product takes both invasive and non-invasive countermeasures, including active chip shielding, key encryption storage, and algorithm encryption methods. Related applications include automotive safety verification, identification and calibration of automotive parts, encryption protection of IoT nodes, security verification of accessories and peripherals, secure boot or download of firmware, and secure storage of encryption keys for host controllers.


Expecting “Good Enough”


"Good enough" security will always be a moving target. In most cases, good enough will never really be good enough; the market moves too fast. As systems and hacker techniques continue to increase in sophistication, "good enough" really is about the cost/reward ratio that companies are willing or able to afford in protecting their assets.

Measures that can be successfully implemented include internal staff training, policies to protect the company network, authentication and encryption methods, and enough technology to provide at least reasonable protection. Fortunately, because criminals try to find the easiest accounts to compromise, good enough may mean implementing security methods that are secure enough to keep criminals away from you and toward others.



Good stuff, share it
If you think this content is good
Please forward or share to Moments


DK Member Center Center Welfare

Have you joined?


Points can be exchanged for various gifts

Go to the "Member Benefits" page!

if there is any problem , Welcome to contact Digi-Key

Digi-Key Customer Service Team


China (RMB) Customer Service

400-920-1199
service.sh@digikey.com
QQ online real-time consultation | QQ number: 4009201199

China (US dollars) / Hong Kong Customer Service
400-882-4440
8523104-0500
china.support@digikey.com


Search for "digikey" or " Digikey Electronics" on WeChat, follow our official WeChat account and register as a member to receive engineers' tips every week, earn points, exchange for gifts, and enjoy benefits.









Click "Read More" below to see more

Let me know you 're watching

 
EEWorld WeChat Subscription

 
EEWorld WeChat Service Number

 
AutoDevelopers

About Us Customer Service Contact Information Datasheet Sitemap LatestNews

Room 1530, Zhongguancun MOOC Times Building,Block B, 18 Zhongguancun Street, Haidian District,Beijing, China Tel:(010)82350740 Postcode:100190

Copyright © 2005-2024 EEWORLD.com.cn, Inc. All rights reserved 京ICP证060456号 京ICP备10001474号-1 电信业务审批[2006]字第258号函 京公网安备 11010802033920号