In a high-security facility, biometric devices are used for access control. To guarantee that these devices are running only authentic firmware, the facility should employ:
- Code Signing
- Firmware Updates
- Hardware Redundancy
- Intrusion Detection Systems
Code signing is essential to guarantee that biometric devices are running only authentic firmware. It verifies the authenticity and integrity of the firmware, preventing unauthorized changes. Firmware updates are important but don't guarantee authenticity. Hardware redundancy and intrusion detection systems focus on system reliability and security but not specifically firmware authenticity.
Loading...
Related Quiz
- Which protocol is designed for scenarios where minimal code footprint is required and the network's bandwidth is limited?
- The storage requirements for IoT data are typically:
- A company is developing a system where factory workers can input data about machine operations, and the machines adjust accordingly. This is an example of:
- To handle the torrent of data from IoT devices, many companies are turning to ________ databases for their scalability and flexibility.
- Industrial IoT devices, often used for monitoring machinery and processes, are commonly referred to as ________.