Consider a rechargeable battery-powered computing device which obeys a policy of never being simultaneously connected to power (charging the battery) and network. The goal is security. When connected to network, it is vulnerable to remote attacks, but the window for remote attacks lasts at most until the battery runs out, at which point, the device shuts off.
A powered-off device protects data in encrypted filesystems. When powered on, the key is in memory.
General idea is, keep the device in a state that is useful for the legitimate user (or a remote attacker) for only the least time that is necessary (minimizing the window for attacks).
No comments :
Post a Comment