About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

Node in 5ireChain to be Attested with Hardware Root of Trust

In the face of increasing sophistication of cyber attacks, the need for an immutable security protocol cannot be downplayed. The hardware components of a network infrastructure can be the point of penetration into a network. With malicious code installed in a hardware, the entire network can be taken down by attackers. 5ire is using Hardware Root of Trust to ensure that the program running on their nodes is malware-free. 

Node in 5ireChain to be Attested with Hardware Root of Trust

In network computing, one thing is certain, there is a threat nearby. But the fear remains the uncertainty of the next victim. 

While the computing world looks for an ultimate solution to secure their network perimeter from existing threats, cyber attackers are committing as much hard work to develop a malware that will penetrate the most secured network. 

Cyber warfare continues as security gets more sophisticated and comprehensive. However, as the world gets more decentralized and connected, new loopholes are inadvertently created.  The incentives of a successful penetration into a network gets more juicy and attackers will never sheath their sword. 

The security of a network is considered a priority. This is even more the case with blockchain networks as they grapple with the trilemma. 

In a bid to deploy a foolproof security layer to the 5ireChain network, 5ire is utilizing hardware root of trust at the foundation of its security layers.

How Hardware Root of Trust Works

Hardware root of Trust is a security protocol that embeds security to the hardware component of a network infrastructure. Here the security layer descends beyond the software aspects. 

Hardware RoT is the first coach in a chain of security protocols. It works with TPM burned into the hardware infrastructure by the manufacturer, attesting that the program running in the hardware is not infected. This is a zero-trust security model because the need to trust the program is eliminated while guaranteeing its safety with a manufacturer-embedded security. 

5ire ensures that all nodes in the 5ireChain ecosystem  establish a certain level of trust. 5ire is introducing a hardware-based root of  trust based on Trusted Platform Module (TPM) technology. 

A TPM device will  allow 5ire nodes to remotely attest devices for any malicious code. TPM  contains a key pair called an Endorsement Key (EK). This is burned inside the  TPM device at the time of manufacture and even the manufacturer does not  know the private key as it is generated inside the TPM device using a random  seed. 

EK cannot be used to directly sign any piece of data, rather it is used to  generate another key pair called the attestation key (AK). An AK can be used  to sign attestation data inside the TPM device. This data is stored in platform  configuration registers (PCR), which act as applications’ hashes, starting when  the node starts and assisting in identifying malicious applications running on  a node. 5ireChain will ensure that all the block-assembling nodes participating  in the network are running similar applications when they boot.

The target of cyber attacks has gone beyond the software a computer is running or its network infrastructure to include the hardwares in which these programs are hosted. The role of hardware in a security outfit is paramount to the integrity of the entire security network. This is because software security is irrelevant if the hardware is already tampered with. 

With hardware RoT, the operating system running in a hardware device is scrutinized to ensure it is not infected. Since this security layer is embedded to the hardware and cannot be changed, it provides an impenetrable security layer on which other security layers directly or indirectly depend on.

Media Contact
Company Name: 5ire
Contact Person: Vilma Mattila
Email: Send Email
Country: United Kingdom
Website: https://5ire.org


Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.