Is Physical Intrusion Detection Necessary?
Importance of Strong Hardware Level Security
Securing the boot process top to bottom can be a hassle depending on your hardware, but it is vital to the readiness of the system. Modern attacks can modify any system down to the bootcode unless it has newer verification mechanisms, such as TPM 2.0 and SOC integration. Recent equipment with the most up to date firmware to ensure data integrity is a must on any commercial grade deployment, any new patches released must be followed with a swift upgrade. And Remote attestation is a very useful feature for firmware and software, it ensures that even if the local device is compromised all the data executed on the cpu is dually verified.
The Principals of Strong Multi-Factor Authentication
In a challenging security landscape there are three main necessities for authentication, something you have, something you know, and something you are. These are the principal variables that keep your logins safe. There are various combinations of this that can still protect your login. For example if you don’t feel comfortable with biometrics you can still secure an account using a FIDO Key, along with a password, and TOTP stored on a secure device with a separate password. That would make two things you know and two things you must have in order to gain access.
Information security in every scope of infrastructure is of vast importance, economically, socially, and politically. In 2019 more than any year prior companies and individuals will succumb to data theft, information manipulation, and other various forms of digital espionage. What can be done about competition that can outspend you at every turn? Simple and inexpensive hardware deployments that ensure endpoint security, protect clients, and employees; alongside active and passive access monitoring. Is this enough? Or should security be built-in already at the application level, the hardware level, or maybe the solution is to regulate security at the democratic level. Various technologies applied to setting open source security standards could be a viable solution.