Главная
Study mode:
on
1
Introduction
2
Disclosures
3
What is reasonable
4
The security pyramid
5
Physical security
6
Hardware kill switches
7
Unexpected attacks
8
Intel AMD
9
Purism
10
Security Tokens
11
TPMS
12
Cubes
13
Desktop
14
USB
15
Video Call Example
16
Hardware Isolation
17
Drivers
18
Disposable Cube
19
Networking Nightmares
20
cisnet cube
21
update path
22
BeyondCorp
23
Backups
24
Remote attestation
Description:
Explore the challenges and solutions for securing remote work environments in this 30-minute USENIX LISA21 conference talk. Delve into a comprehensive analysis of security measures across the entire technology stack, from physical security to the application layer. Learn about innovative approaches, including the use of QubesOS for virtualization-based segmentation and heads firmware for securing the boot environment with TPM. Discover practical strategies for addressing authentication, network security, and hardware isolation issues unique to remote work setups. Gain insights into the concept of "reasonable security" and how to implement effective measures against potential threats in adversarial networks and insecure physical environments.

The Remote Working Security Conundrum - What Is Reasonably Secure Anyway?

USENIX
Add to list
0:00 / 0:00