1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

IDG Contributor Network: The hardware roots of trust

Discussion in 'CSO' started by RSS, Apr 27, 2015.

  1. RSS

    RSS New Member Member

    One question that frequently pops up in evaluating security systems is whether to use hardware-based or software-based encryption systems. Typically, hardware-based encryption is considered more secure because the encryption keys are embedded in the hardware and would require a very sophisticated attack at the hardware layer to acquire the encryption keys. In addition to better security, hardware-based encryption systems do not require system resources which results in much faster performance for cryptographic operations. Software-based encryption, on the other hand, are more vulnerable to hacking attacks particularly from virtual rootkits which penetrate the operating system. These rootkits are a primary threat to corporate systems with root kit malware being delivered to desktops using the attack vectors of social engineering and phishing emails.

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page