Time
2 hours 27 minutes
Difficulty
Intermediate
CEU/CPE
3

Video Transcription

00:00
back to intermediate and point security course. And in this Listen, I'm going to continue talking about protecting the harder of the PC.
00:08
Um, so when we talk about protecting, the harder we mean everything below the OS and we don't mean the physical hardware, we mean the softer that makes that hardware run in the PC.
00:22
So, uh, the only real way to protect hardware off the PC meaning bios and farmers and components is by using hardware
00:33
because every soft fermented, if you have the access of the device before the operating system boots,
00:42
means that whatever you do in later, in no braking system, it doesn't matter. So you have to have some kind of hardware watchdog that is sitting on the mother board. So we remember this. The circles we have hardware and in the
00:57
highest level of priority or priority than you have firmer than we have you. If I
01:03
we have operating system and then in the end, we have application. So applications have the Lowell lowest level of priority.
01:11
Ah, but in order to see few, if I has been compromised, you have to have some piece of harder
01:18
that sits inside the PC
01:21
on basically checks from independently. If something is trying to access the non volatile memory in which bios are you if I is stored
01:34
so this piece of hardware essentially should be ableto access by us
01:44
non volatile memory and to monitor if there is some kind of attempt to write to it.
01:52
Ah, and also,
01:56
if possible, this piece of hard work could be You also used the most monitor some crucial system processes, although for that it will need some kind of software component inside the OS or
02:07
on top of always
02:09
and again. Ideally, this piece of harder would have enough memory to store latest correct
02:17
or
02:20
non infected were version of bios.
02:23
So, um,
02:25
what would be the ideal thing is that when you boot the machine, this piece off the strip compares
02:34
two versions of bias, and if they're different, it rewrites the
02:39
old, the new one that is, ah, runtime bios with the Golden copy or the oldest older version
02:49
and then restarts the machine. So there is no way that even if you can have physical access to the chip that contains bios in that case, it will simply rewrite whatever some malicious person has done.
03:02
And as I said, these things are ideal.
03:07
There are other ways to protect your hard lor,
03:10
and one of these things is to have some kind of software that will simply go online
03:17
and compare look atyour bias version and compare that bias the entire content of off you if I
03:28
to what exists on the manufacturer's website. In that case, it can detect that bias has been tempered,
03:36
and it if it has, you can give you a warning. And then you can menu Aly re flesh the bias off the
03:46
off the PC with whatever software you're using,
03:50
and then you have restored it to the latest known functioning state.
03:59
So when we talk about hardware hardening, it means that we have established level of trust into harbor. So if we are sure that our biases okay, then we can build upon it.
04:11
Uh, harder hardening would also allow should also allow monitoring a crucial security romantic processes in the US, for example,
04:21
it would be nice to have some kind of trip that food monitor if the process that is defined in Windows security centers anti Melber
04:31
has been stopped. So Ifit's stopped. You should restart it
04:36
on. And as I said, this harder hardening wouldn't require a service call if my words detected. So I said, As I said, This is in the ideal world that these things exist on the market today, but on very few models being solved. So this is not something that is a reality, but it can be,
04:57
um,
04:58
obtained so it can. You can purchase a PC that has all of these things
05:04
on, Hopefully in the future. I'm 100% sure from what I know and what I have been asking around with process and Windows that they can build something like this in the trips that as well.
05:17
So it is possible. Technically, it's absolutely achievable. It is just a matter of policy and the awareness. So
05:26
maybe in some near future we'll have these things built inside. The trip set off both Intel on day and the processes at least on PC's.
05:36
So let's do ah, learning check. When we talk about hearted protection, what do we focus on the We focus on protecting former protecting hard drive or SSD, or protecting bias,
05:50
and in this case, we're focusing primarily on protecting bias. Protecting firmer, off some harder components is also important because there are ways to, uh, influence or infest the firmer off the hardware devices.
06:11
But in essentially, we're talking about protecting buys.
06:15
So in this lesson, you have learned everything about how to predict harder. And in next lesson, I'm going to talk about protection of printing devices.

Up Next

Intermediate Endpoint Security

In this course, students will learn the importance of endpoint security. The course will cover fundamentals of protecting hardware assets, operating systems, applications, and network devices.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor