Question

In: Computer Science

1, Describe the evolution of system start-up from BIOS to UEFI, noting vulnerabilities discovered and protections...

1, Describe the evolution of system start-up from BIOS to UEFI, noting vulnerabilities discovered and protections added. Define Secure Boot.

2. Explain and give examples of electromagnetic spying.

Book to use: Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, Sixth Edition.(Chapter 9)

PLEASE ANSWER ALL QUESTIONS!!!

Solutions

Expert Solution

1)The BIOS (Basic Input Output System) or UEFI (Unified Extensible Firmware Interface ), is a firmware that runs when the computer is booted. It initializes the hardware and loads the operating system into the memory. However, being the more advanced solution and overcoming various constraints of BIOS the UEFI is all set to replace the former.
When BIOS begins it’s execution, it first goes for the Power-On Self Test (POST), which secures that the hardware devices are functioning precisely. After that, it checks for the Master Boot Record in the first sector of the chosen boot device. From the MBR, the location of the Boot-Loader is regained after being loaded by BIOS into the computer’s RAM, places the operating system into the main memory.
Unlike BIOS, UEFI doesn’t attend for the MBR in the first sector of the Boot Device. It prepares a list of valid boot volumes called EFI Service Partitions. While the POST procedure, the UEFI firmware scans all of the bootable storage devices which are connected to the system for a valid GUID Partition Table (GPT) and which is an improvement over MBR. GPT doesn’t contain a Boot-Loader like MBR. To find an EFI Service Partition to boot, the firmware itself scans the GPT and directly loads the OS from the right partition. If it fails to find then it goes back to the BIOS-type Booting process which is known as Legacy Boot.


Secure boot is one feature of the Unified Extensible Firmware Interface (UEFI) and a security standard to make sure that a device boots using only software that is trusted by the Original Equipment Manufacturer (OEM). When the PC starts, the firmware verifies the signature of each piece of boot software, including UEFI firmware drivers (also known as Option ROMs), EFI applications, and the operating system. If the signatures are authentic then the PC boots and the firmware produces control to the operating system.

2)Electromagnetic spying is nothing but the side-channel attacks which are performed by measuring the electromagnetic radiation emitted from a device and performing signal analysis on it. For example, radio waves are emitted by electricity moving along a radio transmitter then in the case of electromagnetic side-channel attacks, the attackers are often looking at electromagnetic radiation which is emitted by computing devices and which are made up of circuits.


Related Solutions

Identify common vulnerabilities and healthcare issues in the rural population. Describe challenges of patient care from...
Identify common vulnerabilities and healthcare issues in the rural population. Describe challenges of patient care from a perspective of the patient, provider, and the health system. Discuss strategies to improve health care outcomes in the rural setting
1)Describe what Darwin discovered from his study of the finches on the Galapagos Island? Does this...
1)Describe what Darwin discovered from his study of the finches on the Galapagos Island? Does this give insight into the Dodo? How?
Please fill up Types of Vulnerabilities of Small-scale Fisheries in (Brazil): 1-Change in fishery species habitat?...
Please fill up Types of Vulnerabilities of Small-scale Fisheries in (Brazil): 1-Change in fishery species habitat? 2-Depletion and fluctuation of resources? 3-Climatic hazards and extreme events? 4-Pollution 5-Disease exposure and health issues? 6-Assets and income poverty? 7-Diversification and income dependency
Describe the phases and processes to start-up a new sustainable business and the risks that may...
Describe the phases and processes to start-up a new sustainable business and the risks that may be involved at each stage?
1. Arachni has its own system for scoring vulnerability severity. Which vulnerabilities do you think are...
1. Arachni has its own system for scoring vulnerability severity. Which vulnerabilities do you think are the most severe/critical? Which are the least severe/critical? 2. How would you categorize the Windows Server that you scannedÑa server that stores and processes health dataÑin terms of its criticality? 3. "If you had to summarize the state of the BxB web app to GCPG's executives, what would you say?"
Discuss the historical development and of the evolution of file system data processing starting from the...
Discuss the historical development and of the evolution of file system data processing starting from the file-based system of the past to today. Make sure you explain why file systems were developed. Identify which event you believe is the most important. Briefly describe how your file system works. Be sure to respond to at least one of your classmates’ posts.
__________ manages basic computer operations such as start-up, controls access to system resources, and manages computer...
__________ manages basic computer operations such as start-up, controls access to system resources, and manages computer memory and files. Event data recorders Application software Software defined networking System software
Please identify the channel system/ distribution strategy used by the start-up business of accounting and evaluate...
Please identify the channel system/ distribution strategy used by the start-up business of accounting and evaluate its appropriateness. If the start-up accounting business doesn’t require distribution strategy, focus your argument on the location of the start-up business. How the start-up’s place strategy creates superior value? Promotion Strategy: Identify the promotion strategy used by the start-up business and assess the appropriateness of the strategy to the target market. How the start-up’s promotion strategy create superior value?
(TCO 1) Describe the evolution of consultative selling. What is emphasis of this sales approach? Describe...
(TCO 1) Describe the evolution of consultative selling. What is emphasis of this sales approach? Describe a selling situation (industry, buying scenario, etc.) where this approach may be the most appropriate. How do value-added selling strategies enhance personal selling? (TCO 2) Our textbook discusses three channels of distribution that employ sales professionals. Discuss the main components of the Services Channel. Which career opportunity within this channel do you see yourself working in? Explain why you chose this option.
Diagram and briefly describe cells of the immune system and their basic functions. Start with hematopoietic...
Diagram and briefly describe cells of the immune system and their basic functions. Start with hematopoietic stem cells, and proceed through each class and type of the immune system cells.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT