Hardware Reference
In-Depth Information
Identifying the assets we need to protect
Before we can protect anything, we must know what to protect. The most important assets
are the GPG private keys. With these keys, an attacker can decrypt past encrypted mes-
sages, recover future messages, and use the keys to impersonate you. By protecting your
private key, we are also protecting your reputation, which is another asset. Our decrypted
messages are also an asset. An attacker may not care about your key if he/she can easily ac-
cess your decrypted messages. The BBB itself is an asset that needs protecting. If the BBB
is rendered inoperable, then an attacker has successfully prevented you from accessing
your private keys, which is known as a Denial-Of-Service ( DOS ).
Search WWH ::




Custom Search