The Essentials of Trusted Computing and Cyber Security

article
article
Article
January 06, 2021

The Essentials of Trusted Computing and Cyber Security

Published in Military & Aerospace Electronics

Written by Jamie Whitney

 

We live in a digital world that depends increasingly on technology and the systems that keeps the digital world connected. It also is incumbent on the military and the intelligence community to keep malicious actors at bay from the homeland’s connected infrastructure.

The cyber domain comprises civilian comforts like home appliances, video games, and streaming video services like Netflix and Hulu. However, comforts take a back seat to keeping our connected power grids, hospitals, logistics, satellite communications, and even our own representative democracy.

Last month, the American people participated in a nationwide general election that was protected from outside actors by the U.S. Cyber Command and National Security Agency (NSA).

...

Embedded computer expert Steve Edwards, director of product management at the Curtiss-Wright Corp. Defense Solutions division in Ashburn, Va., notes that hackers want to compromise, augment, or recreate the system.

“You’re listening in to see what you want to do with the information,” Edwards says. “You might be trying to disrupt, or you might be trying to just learn about the system so that you recreate it down the road or come up with countermeasures.”

End goals and uses for hackers depend on what sort of access they have, points out Charlie Kawasaki, chief technical officer for Pacific Star Communications Inc. (PacStar) tactical communications company Portland, Ore. Curtiss-Wright Defense Solutions acquired PacStar in September.

Read the full article.

Comprehensive Protection Throughout the Product Lifecycle

Curtiss-Wright goes well beyond standard approaches to Trusted Computing to provide truly secure solutions for air, ground, and sea platforms. We keep cybersecurity and physical protection in mind, from design and testing to supply chain and manufacturing. This comprehensive, end-to-end approach creates an effective mesh of protection layers that integrate to ensure reliability of Curtiss-Wright products in the face of attempted compromise.

 

Explore Our Trusted, Secure Solutions

Read the Brochure

Trusted Boot

This paper focuses on establishing initial trust in the boot process and the various means to do that, although many of these same techniques are also useful for extending trust to the operating system and application code.