• NEWS
  • INDUSTRY SPOTLIGHT
  • SECURITY BLOGGERS NETWORK
    • ANALYTICS
    • APPSEC
    • CISO
    • CLOUD
    • DEVOPS
    • GRC
    • IDENTITY
    • IDENTITY RESPONSE
    • IOT / ICS
    • THREAT / BREACHES
    • MORE
      • BLOCKCHAIN / DIGITAL CURRENCIES
      • CAREERS
      • CYBERLAW
      • HUMOR
      • MOBILE SECURITY
      • SOCIAL ENGINEERING
  • CHATS
  • LIBRARY
  • WEBINARS
© 2020 · MediaOps Inc. All rights reserved.View Non-AMP Version
  • Homepage
  • Security Bloggers Network

If Firm Implies Secure, Does That Imply My Firmware Is Secure?

Has there ever been a time in your life when you asked, “How does that work”?

In the early days of computing, we learned that BIOS stood for “Basic Input Output (instruction) Set.” It is a set of nonvolatile instructions that dictates how a hardware system should function at startup.

I remember my first experiences interacting with BIOS. I specifically recall configuring my first IBM 8088 computer. There were DIP switches on the motherboard which we could set to dictate a limited range of BIOS functionality at boot such as memory size and the number of floppy disk drives. Then we went to disk-based BIOS utilities on the early IBM/AT (80286) class of computers. When we were introduced to hard drives, we used jumpers to determine the master drive. From there, we went to allowing user access to the BIOS by pressing a key or key-combination at startup.

BIOS has been around for a while now. Only rarely were these instructions referred to as “firmware” in the early days. For sure, nobody ever thought of security on firmware back then, but today, it is a common thought amongst most security engineers.

Origins of Firmware

The term firmware was first coined back in 1967 and was meant to designate microprograms resident in the computer’s control memory but not the physical control memory itself. Originally, it referred to the contents of a writable control store containing microcode that defined and implemented the computer’s instruction set and that could be reloaded to specialize or modify the instructions that the central processing unit (CPU) could execute at startup.

How is it defined today? According to the Tech Terms dictionary, firmware is a software program or set of instructions programmed on a hardware device. It provides the necessary instructions (at startup) for how (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by David Henderson. Read the original post at: https://www.tripwire.com/state-of-security/security-data-protection/firmware-secure/

Tags: firmfirmwaregovernmentIT Security and Data Protectionsecurity
2 years ago
David Henderson

Related Post

  • Why Hackers Love the Pandemic

    The novel coronavirus pandemic has been a boon for cybercriminals seeking profit amid chaos. Tanium's…

  • 5 Reasons Why Mobile Application Security Fails

    Traditionally, large organizations and the enterprise have been the focus for hackers and malicious attacks,…

  • The CISO’s Dilemma: Balancing Security, Productivity With a Housebound Workforce

    How are CISOs managing the tug-of-war between IT security and worker productivity in this new,…

Recent Posts

  • Press Releases

NewDay Scores with TigerGraph Cloud to Fight Financial Fraud

Leading UK Credit Card Consumer Finance Company Uses Advanced Graph Analytics to Intercept Fraudulent Credit Card Applications, Boost Anti-Fraud Efforts…

39 mins ago
  • Press Releases
  • Press Releases

VMRay Closes $25 Million Series B

Digital+ Partners Leads Continuation Funding Round in Growing Automated Threat Analysis & Detection Provider, Closing its Series B Round at…

3 hours ago
  • Security Bloggers Network

The Hacker Mind Podcast: Hacking OpenWRT

For three years OpenWRT had a severe validation problem with its download package manager, until a fuzz tester found and…

3 hours ago
  • Data Security
  • Security Bloggers Network

Goodbye to Flash – if you’re still running it, uninstall Flash Player now

It’s time to say a final “Goodbye” to Flash. (Or should that be “Good riddance”?) With earlier this week seeing…

3 hours ago
  • Network Security
  • Security Bloggers Network

Being a Defender

1. Be a student of (information security, network security, cyber security). Always strive to know what the latest tactics, trends,…

4 hours ago
  • Security Bloggers Network

Smart DNS: Delivering the Best Subscriber Experience

This is the second in a series of blog posts that discuss how smart DNS resolvers can enhance ongoing network…

4 hours ago
  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • Privacy Policy
  • DMCA Compliance Statement
© 2020 · MediaOps Inc. All rights reserved.View Non-AMP Version
  • t