Tuesday, August 9, 2022
  • Shop
  • My Account
    • Cart
    • Checkout
  • Login
NewsDigitize
  • Home
  • News
    • Google
    • Apple
    • Facebook
    • Microsoft
      • Windows
    • WhatsApp
    • Yahoo
    • Flipkart
    • Intel
    • Nvidia
    • Alibaba
    • NASA
    • IBM
    • BlackBerry
    • Linux
    • Airtel
    • Amazon
  • Social
    • Social Media
    • Twitter
    • Facebook
  • Topic
    • Technology
    • Technology company
    • Android
    • Android App
    • App
    • Smart Phones
    • Router
    • WiFi
    • Electronics
    • Space
    • Virtualization
    • Gadget
    • SEO
    • Hacking
    • Robot
    • Transportation
    • Drones
  • Internet
  • Telecom
No Result
View All Result
Plugin Install : Cart Icon need WooCommerce plugin to be installed.
NewsDigitize
  • Home
  • News
    • Google
    • Apple
    • Facebook
    • Microsoft
      • Windows
    • WhatsApp
    • Yahoo
    • Flipkart
    • Intel
    • Nvidia
    • Alibaba
    • NASA
    • IBM
    • BlackBerry
    • Linux
    • Airtel
    • Amazon
  • Social
    • Social Media
    • Twitter
    • Facebook
  • Topic
    • Technology
    • Technology company
    • Android
    • Android App
    • App
    • Smart Phones
    • Router
    • WiFi
    • Electronics
    • Space
    • Virtualization
    • Gadget
    • SEO
    • Hacking
    • Robot
    • Transportation
    • Drones
  • Internet
  • Telecom
No Result
View All Result
Plugin Install : Cart Icon need WooCommerce plugin to be installed.
NewsDigitize
No Result
View All Result

Trusted Cyber Physical Systems looks to protect your critical infrastructure from modern threats in the world of IoT

Chief Editor by Chief Editor
April 27, 2018
in Microsoft, Windows
0 0
0
Home Microsoft

This week at Hannover Messe 2018 in Germany, we are excited to demonstrate how Microsoft is utilizing its more than 25 years of embedded and hardware security experience with a new project codenamed Trusted Cyber Physical Systems (TCPS).

This solution seeks to provide end-to-end security that is resilient to today’s cyber-attacks so our industrial customers can operate their critical infrastructures with confidence and with no negative impact to their intellectual property and customer experience.

As the Internet of Things gains momentum with millions of devices connected to one another, it has become more challenging to secure these devices and services given their increasing complexity. Over the last few months, we have already witnessed attacks to critical infrastructure around the world from Triton infiltrating the control and safety systems of an oil and gas plant to NotPetya shutting down production at a pharmaceutical factory. We can no longer ‘simply’ connect our devices without building in end-to-end security because the financial toll is not the only risk but the risk to human lives and property is too great.

The Triton attack on the control and safety systems of an industrial plant brought to the forefront system vulnerabilities in critical infrastructure even when they are designed with failsafe controls. Attackers used sophisticated malware to remotely control a safety control workstation. Some controllers accidently triggered failsafe mode as the attackers tried to reprogram them. This attack brought to light two challenges prevalent in today’s connected world – a need to prevent malware from taking control of key operations and a hackers’ ability to leverage third-party operators such as admins of cloud hosting services, or OS, and driver vendors to introduce malware.

Illustration A: Compromised System

Illustration A: Compromised System

Illustration B: TCPS Enabled System

Illustration B: TCPS Enabled System

Microsoft’s Trusted Cyber Physical Systems (TCPS) efforts address these challenges to secure critical infrastructure by creating a security pattern to process critical data throughout distributed systems. Data in execution must be protected by Trusted Execution Environments (TEEs) such as Intel SGX, ARM TrustZone, and SecureElements. Components must not only use secure protocols, and protect keys and data at rest, they must also perform all critical operations in a TEE that is protected from public cloud hosters and OS vendors. Our overarching security principle for TCPS is that the solution owner/operator must not lose control over their critical systems.

Here is how Trusted Cyber Physical Systems is realized with the following four properties:

  • Separation of critical execution: Help protect critical infrastructure from malware threats by separating non-critical from critical operations and concentrating on using hardware isolation to protect control of physical systems.
  • Inspectability of execution process: Ensure that any code that handles critical operations must be auditable by operators through source code review.
  • Attestability of processing environment: During operation, each component must be able to verify that data is received and sent only from trustworthy sources. A component also needs to attest its trustworthiness to other components.
  • Minimizing number of entities that need to be trusted: Reducing the number of trusted entities significantly reduces the attack surface for critical infrastructure. In the ideal TCPS solution, the operator will maintain the only root of trust for critical code execution.

Why work with Microsoft on securing your Critical Infrastructure?

  • We at Microsoft have taken a holistic approach with TCPS based on years of security, cloud, and embedded experience.
  • With TCPS, you can be assured that code inspection by customers and third parties will be on Microsoft-provided trusted applications and services.
  • Azure confidential computing brings trusted execution to the cloud
  • The Windows IoT Device Update Center can be used to deliver patches via the Windows Update global CDN
  • Windows 10 IoT Core support for NXP i.MX 6 and i.MX 7 enables TCPS to the wire with trusted I/O
  • Leaders in cross-platform industry standards efforts (ex: OPC, IIC, TCG, IETF)

Microsoft and our partners are seeking to unlock trusted execution in the cloud, on devices controlling infrastructure and on edge devices. The power of TCPS brings trusted execution to the wires and pins that control critical infrastructure, enabling end-to-end critical infrastructure solutions.

You can find-out more about what we’re building and how to partner with us in bringing these solutions to market. If you are attending Hannover Messe Industry 2018, please visit us at Hall 7 C40. You can also learn more via our Whitepaper,overview of TCPS or contact us at tcps@microsoft.com.

Source: blogs.windows.com

ShareTweetShare
Chief Editor

Chief Editor

Next Post
NVIDIA, SoftBank Incubator DEEPCORE Team Up to Fuel AI Startups in Japan

NVIDIA, SoftBank Incubator DEEPCORE Team Up to Fuel AI Startups in Japan

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • Trending
  • Comments
  • Latest
Vodafone India says IoT becoming fastest growing segment for enterprise biz; mulling narrowband IoT network

Vodafone India says IoT becoming fastest growing segment for enterprise biz; mulling narrowband IoT network

April 16, 2018
Here’s how you can de-link your Facebook profile from Instagram

Here’s how you can de-link your Facebook profile from Instagram

February 25, 2022
Android Oreo: 18 advanced tips and tricks

Android Oreo: 18 advanced tips and tricks

March 19, 2018
What are the Basic Elements of a Fiber Optic Communication System?

What are the Basic Elements of a Fiber Optic Communication System?

April 4, 2018
Apple’s plan to put health records on your phone has huge implications for medicine

Apple’s plan to put health records on your phone has huge implications for medicine

6

The totaly amazing street art collection of 2016

5

Everything you ever need to know about flowers

4

Why you need an amazing photography collection

3
On August 15, Ola Electric will introduce a new electric vehicle in India; get all the details here

On August 15, Ola Electric will introduce a new electric vehicle in India; get all the details here

August 8, 2022
August 10 is the scheduled launch date for the Tecno Camon 19 Pro 5G India

August 10 is the scheduled launch date for the Tecno Camon 19 Pro 5G India

August 8, 2022
Realme C33 Color Options and Storage Rumors; Imminent India Launch: Every Detail

Realme C33 Color Options and Storage Rumors; Imminent India Launch: Every Detail

August 8, 2022
The Qualcomm Snapdragon 8 Gen 2 chipset might be featured in the Samsung Galaxy S23 Ultra

The Qualcomm Snapdragon 8 Gen 2 chipset might be featured in the Samsung Galaxy S23 Ultra

August 8, 2022
NewsDigitize

Technological Advances

Newsguard, a global organisation that analyses news sources for certain journalistic standards, has given the newsdigitize website a GREEN rating for credibility and trustworthiness.

Footer Menu

  • HOME
  • NEWS
  • SOCIAL
  • TOPIC
  • INTERNET
  • TELECOM

Recent News

On August 15, Ola Electric will introduce a new electric vehicle in India; get all the details here

On August 15, Ola Electric will introduce a new electric vehicle in India; get all the details here

August 8, 2022
August 10 is the scheduled launch date for the Tecno Camon 19 Pro 5G India

August 10 is the scheduled launch date for the Tecno Camon 19 Pro 5G India

August 8, 2022

© 2022 All Rights Reserved newsdigitize.co.in.

No Result
View All Result
  • Home
  • News
    • Google
    • Apple
    • Facebook
    • Microsoft
      • Windows
    • WhatsApp
    • Yahoo
    • Flipkart
    • Intel
    • Nvidia
    • Alibaba
    • NASA
    • IBM
    • BlackBerry
    • Linux
    • Airtel
    • Amazon
  • Social
    • Social Media
    • Twitter
    • Facebook
  • Topic
    • Technology
    • Technology company
    • Android
    • Android App
    • App
    • Smart Phones
    • Router
    • WiFi
    • Electronics
    • Space
    • Virtualization
    • Gadget
    • SEO
    • Hacking
    • Robot
    • Transportation
    • Drones
  • Internet
  • Telecom

© 2022 All Rights Reserved newsdigitize.co.in.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In