BIOS Protection Guidelines: Recommendations of the National Institute of Standards and Technology (Special Publication 800-147) (Paperback)
David Cooper, William Polk, Andrew Regenscheid, Murugiah Souppaya
- 出版商: CreateSpace Independ
- 出版日期: 2012-07-02
- 售價: $740
- 貴賓價: 9.5 折 $703
- 語言: 英文
- 頁數: 30
- 裝訂: Paperback
- ISBN: 1478179155
- ISBN-13: 9781478179153
-
相關分類:
Apple Developer
海外代購書籍(需單獨結帳)
買這商品的人也買了...
-
$299How Customers Think: Essential Insights into the Mind of the Market (Hardcover)
-
$980$774 -
$1,880$1,786 -
$620$527 -
$460$359 -
$780$663 -
$680$537 -
$400$380 -
$520$343 -
$450$356 -
$500$395 -
$560$437 -
$940$700 -
$480$379 -
$480$408 -
$1,860$1,767 -
$1,568Android Hacker's Handbook (Paperback)
-
$680$578 -
$480$408 -
$280$218 -
$680$449 -
$380$296 -
$590$502 -
$360$324 -
$380$296
相關主題
商品描述
This National Institute of Standards and Technology Special Publication 800-147 “BIOS Protection Guidelines” document provides guidelines for preventing the unauthorized modification of Basic Input/Output System (BIOS) firmware on PC client systems. Unauthorized modification of BIOS firmware by malicious software constitutes a significant threat because of the BIOS’s unique and privileged position within the PC architecture. A malicious BIOS modification could be part of a sophisticated, targeted attack on an organization —either a permanent denial of service (if the BIOS is corrupted) or a persistent malware presence (if the BIOS is implanted with malware). As used in this publication, the term BIOS refers to conventional BIOS, Extensible Firmware Interface (EFI) BIOS, and Unified Extensible Firmware Interface (UEFI) BIOS. This document applies to system BIOS firmware (e.g., conventional BIOS or UEFI BIOS) stored in the system flash memory of computer systems, including portions that may be formatted as Option ROMs. However, it does not apply to Option ROMs, UEFI drivers, and firmware stored elsewhere in a computer system. While this document focuses on current and future x86 and x64 client platforms, the controls and procedures are independent of any particular system design. Likewise, although the guide is oriented toward enterprise-class platforms, the necessary technologies are expected to migrate to consumer-grade systems over time. Future efforts may look at boot firmware security for enterprise server platforms.~