Foil threats -- Secure storage on SoCs
By Russ Baker and Al Hawtin, Elliptic Semiconductor
August 30, 2006 -- networksystemsdesignline.com
Information Security has been one of the primary focus points of IT strategy and spending over the past several years. This is due to the convergence of such factors as:
- The dramatic increase in the volume of data being produced and processed by organizations (IDC reports that corporate storage requirements grow from 15-40% annually). Some of this growth is driven by legislative requirements mandating that data be archived for seven to ten years.
- The geographic distribution of modern business with outsourcing, off-shoring and subcontracting making the protection of data much more complex.
- Reliance on data mining as a business tool that relies on the detailed history of customer demographics, sales, product mix, margin and geography. Much of this information is highly sensitive.
- Risk of data theft and recent, high-profile incidents, such as the highly-publicized loss of tapes belonging to Bank of America, Time Warner and Citigroup and lap tops with sensitive data from Fidelity Investment (sensitive data on 196,000 HP employees) and by UC Berkley (private information on 100,000 students and staff).
- Theft of storage media, including both primary active media (such as disks) and secondary backup media (such as tapes)
- Compromise of host and/or client hardware or personnel to gain unauthorized access to information
- Compromise of authentication and authorization systems to gain unauthorized access to information
- "Snooping" of data moving across the network or within devices
- Introduction of viruses, worms, Trojan horses and other parasitic programs designed to compromise systems
Figure 1 illustrates a typical enterprise network, which spans multiple geographic locations leveraging the Internet. Storage security requirements impact the Storage Area Network (SAN), Tape Backup and RAID storage that is used in Network Attached Storage (NAS) as well as desktop computers and laptops.
E-mail This Article | Printer-Friendly Page |
Related Articles
- Secure Mobile Payments - Protecting display data in TrustZone-enabled SoCs with the Evatronix PANTA Family of Display Processors
- The Growing Need for Secure Storage in Automotive Systems
- Serial storage SoCs demanding to test
- Select the Right Microcontroller IP for Your High-Integrity SoCs
- Adding Cache to IPs and SoCs
New Articles
- Quantum Readiness Considerations for Suppliers and Manufacturers
- A Rad Hard ASIC Design Approach: Triple Modular Redundancy (TMR)
- Early Interactive Short Isolation for Faster SoC Verification
- The Ideal Crypto Coprocessor with Root of Trust to Support Customer Complete Full Chip Evaluation: PUFcc gained SESIP and PSA Certified™ Level 3 RoT Component Certification
- Advanced Packaging and Chiplets Can Be for Everyone
Most Popular
- System Verilog Assertions Simplified
- System Verilog Macro: A Powerful Feature for Design Verification Projects
- UPF Constraint coding for SoC - A Case Study
- Dynamic Memory Allocation and Fragmentation in C and C++
- Enhancing VLSI Design Efficiency: Tackling Congestion and Shorts with Practical Approaches and PnR Tool (ICC2)