New! Sign up for our free email newsletter.
Science News
from research organizations

Protecting computers at start-up: New guidelines

Date:
December 21, 2011
Source:
National Institute of Standards and Technology (NIST)
Summary:
A new draft computer security publication provides guidance for vendors and security professionals as they work to protect personal computers as they start up.
Share:
FULL STORY

A new draft computer security publication from the National Institute of Standards and Technology (NIST) provides guidance for vendors and security professionals as they work to protect personal computers as they start up.

The first software that runs when a computer is turned on is the "Basic Input/Output System" (BIOS). This fundamental system software initializes the hardware before the operating system starts. Since it works at such a low level, before other security protections are in place, unauthorized changes -- malicious or accidental -- to the BIOS can cause a significant security threat.

"Unauthorized changes in the BIOS could allow or be part of a sophisticated, targeted attack on an organization, allowing an attacker to infiltrate an organization's systems or disrupt their operations," said Andrew Regenscheid, one of the authors of BIOS Integrity Measurement Guidelines (NIST Special Publication 800-155). In September, 2011, a security company discovered the first malware designed to infect the BIOS, called Mebromi. "We believe this is an emerging threat area," said Regenscheid. These developments underscore the importance of detecting changes to the BIOS code and configurations, and why monitoring BIOS integrity is an important element of security.

SP 800-155 explains the fundamentals of BIOS integrity measurement -- a way to determine if the BIOS has been modified -- and how to report any changes. The publication provides detailed guidelines to hardware and software vendors that develop products that can support secure BIOS integrity measurement mechanisms. It may also be of interest to organizations that are developing deployment strategies for these technologies.

This publication is the second in a series of BIOS documents. BIOS Protection Guidelines (NIST SP 800-147) was issued in April, 2011. It provides guidelines for computer manufacturers to build in features to secure the BIOS against unauthorized modifications. The detection mechanisms in SP 800-155 complement the protection mechanisms outlined in SP 800-147 to provide greater assurance of the security of the BIOS.

Copies of the publication can be downloaded from

http://csrc.nist.gov/publications/drafts/800-155/draft-SP800-155_Dec2011.pdf.

Story Source:

Materials provided by National Institute of Standards and Technology (NIST). Note: Content may be edited for style and length.


Cite This Page:

National Institute of Standards and Technology (NIST). "Protecting computers at start-up: New guidelines." ScienceDaily. ScienceDaily, 21 December 2011. <www.sciencedaily.com/releases/2011/12/111221105826.htm>.
National Institute of Standards and Technology (NIST). (2011, December 21). Protecting computers at start-up: New guidelines. ScienceDaily. Retrieved April 19, 2024 from www.sciencedaily.com/releases/2011/12/111221105826.htm
National Institute of Standards and Technology (NIST). "Protecting computers at start-up: New guidelines." ScienceDaily. www.sciencedaily.com/releases/2011/12/111221105826.htm (accessed April 19, 2024).

Explore More

from ScienceDaily

RELATED STORIES