Skip to content

Latest commit

 

History

History
13 lines (10 loc) · 1.04 KB

File metadata and controls

13 lines (10 loc) · 1.04 KB

Modern Computer Architecture and Organization Second Edition, by Jim Ledin. Published by Packt Publishing.

Chapter 14 - Cybersecurity and Confidential Computing Architectures

This chapter introduces computing architectures suitable for applications that require an exceptional assurance of security. Critical application areas like national security systems and financial transaction processing demand this high level of protection. These systems must be resilient against a broad range of cybersecurity threats including malicious code, covert channel attacks, and attacks enabled by physical access to the computing hardware. Topics addressed in this chapter include cybersecurity threats, encryption, digital signatures, and secure hardware and software design.

This chapter will cover the following topics:

  • Cybersecurity threats
  • Features of secure hardware
  • Designing for security at the architectural level
  • Ensuring security in system and application software

Answers to Exercises

Answers to Exercises