CompTIA Security+ Exam Notes

CompTIA Security+ Exam Notes
Let Us Help You Pass
Showing posts with label BitLocker. Show all posts
Showing posts with label BitLocker. Show all posts

Monday, January 27, 2025

Understanding the Role of Trusted Platform Module (TPM) in Enhancing System Security

 TPM (Trusted Platform Module)

A Trusted Platform Module (TPM) is a specialized microchip embedded within a computer's motherboard that functions as a hardware-based security mechanism. It is designed to securely store and manage cryptographic keys, such as passwords and encryption keys, to protect sensitive information and verify the integrity of a system by detecting any unauthorized modifications during boot-up or operation. The TPM essentially acts as a tamper-resistant component to enhance overall system security. It can be used for features like BitLocker drive encryption and secure logins through Windows Hello. 

Key points about TPMs:
  • Cryptographic operations: TPMs utilize cryptography to generate, store, and manage encryption keys, ensuring that only authorized entities can access sensitive data. 
  • Tamper resistance: A key feature of a TPM is its tamper-resistant design. Attempts to physically manipulate the chip to extract sensitive information will be detected, potentially triggering security measures. 
  • Platform integrity measurement: TPMs can measure and record the state of a system during boot-up, allowing for verification that the system hasn't been tampered with and is running the expected software. 
  • Endorsement key: Each TPM has a unique "Endorsement Key," which acts as a digital signature to authenticate the device and verify its legitimacy. 
Applications:

TPMs are commonly used for features like:
  • Full disk encryption: Securing hard drives with encryption keys stored within the TPM. 
  • Secure boot: Verifying that the operating system loaded during boot is trusted and hasn't been modified. 
  • User authentication: Storing credentials like passwords or biometric data for secure logins. 
  • Virtual smart cards: Implementing digital certificates and secure access to sensitive applications. 
How a TPM works:
  • Key generation: When a user needs to create a new encryption key, the TPM generates a secure key pair and keeps the private key securely within the chip. 
  • Storage: The TPM stores the encryption keys and other sensitive data in a protected area, preventing unauthorized access. 
  • Attestation: When a system needs to prove its identity, the TPM can create a digital signature (attestation) based on its unique Endorsement Key, verifying its authenticity. 
Important considerations:
  • Hardware requirement: A computer must install a dedicated TPM chip on the motherboard to utilize a TPM. 
  • Operating system support: The operating system needs to be configured to utilize the TPM functionalities for enhanced security.
This is covered in A+, Security+, and SecurityX (formerly known as CASP+)

Wednesday, October 9, 2024

Data at Rest

 Data at Rest

Data at rest is stored in a physical location, such as a computer's hard drive or a server, and is not actively used or moved between devices or networks. It can include both structured and unstructured data.

Examples of data at rest include Spreadsheet files on a laptop, Videos on a mobile device, Employment records in a company's HR system, and Sales information in a company's database.

Data at rest is often the most sensitive data in an organization and can be very valuable to hackers. Data breaches at rest can have serious consequences, including Large financial losses, Damage to a company's reputation, Regulatory fines, and Civil liability.

To protect data at rest, organizations can use techniques such as:

Encryption: Makes the data indecipherable and useless to anyone who steals it using FDE (Full Disk Encryption), SED (Self-Encrypting Drives), and BitLocker.

Data tokenization: Replaces sensitive data with non-sensitive tokens that are meaningless on their own

Layered password protection: Sets access controls to data at different levels of sensitivity