Security-Centric Computer Architecture: Hardware-Based Approaches for Cyber-Resilient Systems
DOI:
https://doi.org/10.63282/3050-9262.IJAIDSML-V5I3P101Keywords:
Cyber-resilience, Computer architecture, Hardware security, Data-centric security, Trusted platform modules, Secure enclaves, Policy-based protectionAbstract
In an era marked by increasing cyber threats, the design of computer architectures that prioritize security is paramount. This paper explores hardware-based approaches to create cyber-resilient systems, focusing on integrating security directly into the architecture rather than as an afterthought. By leveraging specialized hardware components, such as Trusted Platform Modules (TPMs) and secure enclaves, we can enhance the integrity and confidentiality of data across various computing environments. The proposed architecture emphasizes a layered security model that incorporates both preventive and reactive measures, ensuring robust protection against unauthorized access and data breaches. Additionally, we discuss the importance of a data-centric security approach, which prioritizes the protection of sensitive data throughout its lifecycle. This involves implementing policy-based controls, continuous monitoring, and automated responses to potential threats. Ultimately, this research aims to provide a framework for developing systems that not only withstand attacks but also recover quickly from incidents, thus maintaining operational continuity and trust in digital infrastructures
References
[1] https://www.zengrc.com/blog/what-is-a-data-centric-architecture-for-security/
[2] https://ee.stanford.edu/research/computer-architecture-security-hw-sw
[3] https://dl.acm.org/doi/abs/10.5555/1404803.1404838
[4] https://en.wikipedia.org/wiki/Computer_insecurity
[5] https://en.wikipedia.org/wiki/Data-centric_security
[6] https://www.mdpi.com/journal/applsci/special_issues/52U80QAE2R
[7] https://www.paloaltonetworks.com/cyberpedia/data-centric-security
[9] https://www.nextlabs.com/intelligent-enterprise/data-centric-security/
[10] https://scholarsmine.mst.edu/cgi/viewcontent.cgi?article=5592&context=masters_theses
[11] https://en.wikipedia.org/wiki/Data-centric_security
[12] https://structured.com/security/security-architecture/
[13] https://www.archtis.com/what-is-data-centric-security/
[14] https://www.researchgate.net/publication/220284156_Memory-Centric_Security_Architecture
[15] https://ieeexplore.ieee.org/document/7495578/
[17] https://swc.rwth-aachen.de/research/projects/scam-security-centric-architecture-modelling/
[18] https://holoware.co/computer-hardware-security-essential-cybersecurity-measures/
[19] https://sepiocyber.com/blog/hardware-attacks-the-art-of-disguise/
[21] https://www.techtarget.com/searchitoperations/definition/hardware-security
[23] https://blackbear-ics.com/cybersecurity-hardware/
[24] https://www.imperva.com/learn/application-security/cyber-security-threats/
[25] https://www.simplilearn.com/tutorials/cyber-security-tutorial/types-of-cyber-attacks
[28] https://holoware.co/computer-hardware-security-essential-cybersecurity-measures/
[31] https://www.scrut.io/post/cybersecurity-architecture-and-why-is-it-important
[32] https://www.ardoq.com/blog/cybersecurity-architecture
[33] https://sprinto.com/blog/cybersecurity-architecture/
[34] https://www.it-cisq.org/2020/11/4-steps-to-fix-and-implement-cyber-resilient-architecture/
[35] https://www.geeksforgeeks.org/architecture-patterns-for-resilient-systems/
[36] https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-160v2r1.pdf
[37] https://anm.com/blog/building-a-cyber-resilient-architecture/
[39] https://www.youtube.com/watch?v=8bpbrlE5B8M
[40] https://www.linkedin.com/pulse/cyber-resilience-starts-strong-security-architecture-mahesh-pbkdf
[41] https://www.mitre.org/sites/default/files/pdf/12_3795.pdf
[42] https://www.pnnl.gov/explainer-articles/cyber-resilience
[43] https://arxiv.org/abs/2303.16307
[44] https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-160v2r1.pdf