There are many risks associated with Cybersecurity and in this blog titled “The Best Hacker Defense is a Good Offense” discusses the risks and the possible solutions. It has been kindly provided by our friends at Crystal Group written by Jim Shaw their Executive Vice President of Engineering. For more information on the Crystal Group’s product range and how their products will provide you extra security, contact us.
The Best Hacker Defense is a Good Offense
The risks associated with cybersecurity are growing far faster than anyone ever expected. While we hear reports of high-profile attacks on a regular basis, there are many more that go unreported. Consider it unauthorised data mining.
Risks associated with Cybersecurity
Attacks are becoming more prevalent. As connections to the internet occur. Therefore, growing the “pool” of vulnerable points. The cyber community calls this “increasing the attack surface.” This is true for just about any market, but certainly includes the military, power and utility industries, security, autonomous vehicle developers, and so on — all places we consider critical infrastructure points — extending into equipment used in industrial spaces, like power substations, smart grids, and petroleum processing plants. As we populate these areas with more sensors, our cybersecurity challenges are compounded.
Most experts believe that it’s just a matter of time before every platform worth hacking, is attacked. The key is to ensure that when it’s your turn, the information that’s exposed doesn’t put your institution, constituents or data at risk.
While the potential risks differ in every application, some are far more serious than others. Some recent examples include malware that can erase your entire system, unauthorised encryption of your data, or unauthorised use of a network to seek access to sister company systems.
In military applications, like weapons systems or advanced communications, the need for extreme security is not only obvious, but non-negotiable. Each program has specific classifications that define the required level of security. For example, the SIPRNet and NIPRNet enclaves have lower security requirements than those specified in the Joint Worldwide Intelligence Communications System (JWICS), a network run by various defence agencies, including the Department of Defense (DoD) and Department of Homeland Security.
The Crystal Group Solution
Staying current on these requirements is critical for Crystal Group. For us to effectively and accurately design and develop system architectures that allow our customers to control the security of their products and applications, we have to start with a clear understanding of what the customer is trying to accomplish, the vulnerabilities and threats, and what defense mechanisms must be in place to prevent those threats from being realised.
The RS1104 rugged 1U server can be customised to address both data at rest and secure network attached storage security levels with features like self-encrypted drives, instant secure erase and key management.
With this information, we develop a secure platform. Which is hardware enabled. Plus provides the level of security for the application. Virtual machines can handle different security functions. Plus with hardware locks and or tamper-proof construction.
We start with a rugged hardware Root of Trust to monitor the boot loader files for authenticity and pedigree. This includes verifying the BIOS and firmware and monitoring any board revisions to confirm that everything in the software is legitimate and secure. By loading the image as a secure boot enabled device, the customer always receives a computer that performs as expected. With a solid foundation in place, we incorporate FIPS 140-2 SAS solid-state drives for data at rest protection.
Given the risks associated with cybersecurity, the rate and scale at which is compounds, and the evolving requirements, it’s next to impossible for any single company to address the full range of cybersecurity needs. That’s why Crystal Group has forged strong relationships with trusted partners that are experts in their respective areas. This allows us to focus on our core competency, while integrating theirs. Through this ecosystem of partners, we can deliver the right cyber secure combination of rugged hardware and certified software for each customer program, which eliminates any uncertainty or hassle for the customer.
A great example is how we’ve partnered with RackTop to create a cyber-converged network platform. That encrypts large data streams with near-zero latency. The system provides a simplification in policy management, access to data, data at rest security, key rotation and key management. As the embedded world sees more sensors pumping data into a network, this becomes critically important. Overall, capabilities can be narrowed or expanded. Whilst making it easy to manage complex security networks and large amounts of data.
About the Author
Jim Shaw joined Crystal Group in January 2006 as Vice President of Engineering; in 2011, promoted to Executive Vice President of Engineering. Jim has responsibility for guiding the Engineering department and is the leading member of the product development team. Jim also provides direction as the Quality Management Representative for Crystal Group.
Jim’s innovative design prowess. Led to the birth of the rugged series (RS) chassis for the military and industrial computing markets. During Jim’s tenure at Crystal Group the company has expanded its product lines. Into areas such as storage, displays, rugged switches, and custom power supply designs.
Jim holds a Bachelor of Science degree in Mechanical Engineering from Iowa State University. Also a Masters of Business Administration from the University of Iowa. Prior to joining Crystal Group, Jim held a management position in engineering at Rockwell Collins, located in Cedar Rapids, Iowa. Nominated three times as Rockwell Collins’ Engineers of the Year. For his work in high performance electronics packaging. He has authored or co-authored ten international patents.
Finally, for more information, contact us.