Session:Secure communications hardware

From SHA2017 Wiki
Revision as of 17:52, 24 July 2017 by Eal (talk | contribs) (Created page with "{{Session |Has session tag=security, hardware, communication |Is for kids=No |Has description=This talk will focus on securing end-point-devices from attack by state level act...")

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search
Description This talk will focus on securing end-point-devices from attack by state level actors. This kind of IT security is important when these devices are operating in potentially hostile environments. Examples would be: securely communicating from an embassy, operating as a journalist and running certain industrial production environments.

First we will show some attack vectors employed in the past by state actors. Then protection measures are demonstrated, starting with low level treat protection and ending in full-scale paranoid mode. It will demonstrate how far one must go (and can go) to achieve a certain level of security.

Website(s) https://www.fsfe.org
Type Talk
Kids session No
Keyword(s) hardware, security
Tags security, hardware, communication
Processing village Village:ItalianEmbassy
Person organizing User:Multimho
Language en - English
en - English
Other sessions...

refresh

This talk will focus on securing end-point-devices from attack by state level actors. This kind of IT security is important when these devices are operating in potentially hostile environments. Examples would be: securely communicating from an embassy, operating as a journalist and running certain industrial production environments. First we will show some attack vectors employed in the past by state actors. Then protection measures are demonstrated, starting with low level treat protection and ending in full-scale paranoid mode. It will demonstrate how far one must go (and can go) to achieve a certain level of security.