Thursday, January 16, 2025

Week 06 Posting - HSMs

 Since this degree is my first introduction to the security measures, methods, hardware, and software used for hardening networks, I never heard of Hardware Security Modules before. I had no idea there was a security method where you could store the cryptographic keys on a device totally separated from the network itself. That way, in case the network gets hacked, the hackers would still not be able to get the keys required to decrypt the stolen data. Even if they had scoured the entire network from top to bottom for the keys, they would have had no luck since the keys are stored on a device that is removed and isolated from the network. I wonder if using an HSM and getting hacked means you can change the keys for the entire network again, making the network's security much harder to get into since a new key is now required. Do cryptocurrency wallets work similarly since you can buy a separate currency storage device? HSMs enamor me, and I would love to see them in use in person.

No comments:

Post a Comment

Week 12 Posting - Write about my choice of topics.

 I never had a set goal on what I wanted to blog about until the end, after finishing all of the week's assignments. I wanted to leave m...