Misplaced Pages

Utimaco Atalla

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.

Data security means protecting digital data , such as those in a database , from destructive forces and from the unwanted actions of unauthorized users, such as a cyberattack or a data breach .

#649350

38-472: Utimaco Atalla , founded as Atalla Technovation and formerly known as Atalla Corporation or HP Atalla , is a security vendor, active in the market segments of data security and cryptography . Atalla provides government-grade end-to-end products in network security , and hardware security modules (HSMs) used in automated teller machines (ATMs) and Internet security . The company was founded by Egyptian engineer Mohamed M. Atalla in 1972. Atalla HSMs are

76-402: A hard disk drive .  Disk encryption typically takes form in either software (see disk encryption software ) or hardware (see disk encryption hardware ). Disk encryption is often referred to as on-the-fly encryption (OTFE) or transparent encryption. Software-based security solutions encrypt the data to protect it from theft. However, a malicious program or a hacker could corrupt

114-411: A combination of hardware-based security and secure system administration policies. Backups are used to ensure data that is lost can be recovered from another source. It is considered essential to keep a backup of any data in most industries and the process is recommended for any files of importance to a user. Data masking of structured data is the process of obscuring (masking) specific data within

152-479: A database table or cell to ensure that data security is maintained and sensitive information is not exposed to unauthorized personnel. This may include masking the data from users (for example so banking customer representatives can only see the last four digits of a customer's national identity number), developers (who need real production data to test new software releases but should not be able to see sensitive financial data), outsourcing vendors, etc. Data erasure

190-553: A father of information security technology. It merged in 1987 with Tandem Computers , who were then acquired by Compaq in 1997. The Atalla Box protected over 90% of all ATM networks in operation as of 1998, and secured 85% of all ATM transactions worldwide as of 2006. In 2001, HP acquired Compaq. In 2015, HP was divided into two companies, and the Atalla products were assigned to the newly formed Hewlett Packard Enterprise (HPE). On September 7, 2016, HPE CEO Meg Whitman announced that

228-419: A network and may include more than one company. For this reason, modern online transaction processing software uses client or server processing and brokering software that allows transactions to run on different computer platforms in a network. In large applications, efficient OLTP may depend on sophisticated transaction management software (such as IBM CICS ) and/or database optimization tactics to facilitate

266-696: A secure PIN system. A key innovation of the Atalla Box was the key block , which is required to securely interchange symmetric keys or PINs with other actors of the banking industry. This secure interchange is performed using the Atalla Key Block (AKB) format, which lies at the root of all cryptographic block formats used within the Payment Card Industry Data Security Standard (PCI DSS) and American National Standards Institute (ANSI) standards. Fearful that Atalla would dominate

304-402: A user by hard disk and DVD controllers making illegal access to data impossible. Hardware-based access control is more secure than the protection provided by the operating systems as operating systems are vulnerable to malicious attacks by viruses and hackers. The data on hard disks can be corrupted after malicious access is obtained. With hardware-based protection, the software cannot manipulate

342-413: A user to log in, log out and set different levels through manual actions. The device uses biometric technology to prevent malicious users from logging in, logging out, and changing privilege levels. The current state of a user of the device is read by controllers in peripheral devices such as hard disks. Illegal access by a malicious user or a malicious program is interrupted based on the current state of

380-786: Is a method of software-based overwriting that completely wipes all electronic data residing on a hard drive or other digital media to ensure that no sensitive data is lost when an asset is retired or reused. In the UK , the Data Protection Act is used to ensure that personal data is accessible to those whom it concerns, and provides redress to individuals if there are inaccuracies. This is particularly important to ensure individuals are treated fairly, for example for credit checking purposes. The Data Protection Act states that only individuals and companies with legitimate and lawful reasons can process personal information and cannot be shared. Data Privacy Day

418-408: Is a multi-chip embedded cryptographic module, which consists of a hardware platform, a firmware secure loader, and firmware. The purpose of the module is to load Approved application programs, also referred to as personalities, securely. The firmware monitors the physical security of the cryptographic module. Verification that the module is approved can be observed. The Atalla security policy addresses

SECTION 10

#1732855968650

456-492: Is a type of database system used in transaction-oriented applications, such as many operational systems. "Online" refers to the fact that such systems are expected to respond to user requests and process them in real-time (process transactions). The term is contrasted with online analytical processing (OLAP) which instead focuses on data analysis (for example planning and management systems ). The term "transaction" can have two different meanings, both of which might apply: in

494-630: Is an international holiday started by the Council of Europe that occurs every January 28. Since the General Data Protection Regulation (GDPR) of the European Union (EU) became law on May 25, 2018, organizations may face significant penalties of up to €20 million or 4% of their annual revenue if they do not comply with the regulation. It is intended that GDPR will force organizations to understand their data privacy risks and take

532-421: Is an organization that helps standardize computing security technologies. The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary international information security standard for organizations that handle cardholder information for the major debit , credit , prepaid, e-purse , automated teller machines , and point of sale cards. The General Data Protection Regulation (GDPR) proposed by

570-445: Is generally characterized by much more complex queries, in a smaller volume, for the purpose of business intelligence or reporting rather than to process transactions. Whereas OLTP systems process all kinds of queries (read, insert, update and delete), OLAP is generally optimized for read only and might not even support other kinds of queries. OLTP also operates differently from batch processing and grid computing . In addition, OLTP

608-447: Is often contrasted to online event processing (OLEP), which is based on distributed event logs to offer strong consistency in large-scale heterogeneous systems. Whereas OLTP is associated with short atomic transactions, OLEP allows for more flexible distribution patterns and higher scalability, but with increased latency and without guaranteed upper bound to the processing time. OLTP has also been used to refer to processing in which

646-577: Is transformed by the device, using a microprocessor , into another code for the teller. The Identikey system connected directly into the ATM without hardware or software changes, and was designed for easy operation by the teller and customer. During a transaction , the customer's account number was read by the card reader . This process replaced manual entry and avoided possible key stroke errors. It allowed users to replace traditional customer verification methods such as signature verification and test questions with

684-417: The payment card industry 's de facto standard, protecting 250   million card transactions daily (more than 90   billion transactions annually) as of 2013, and securing the majority of the world's ATM transactions as of 2014. The company was originally founded in 1972, initially as Atalla Technovation, before it was later called Atalla Corporation. The company was founded by Dr. Mohamed M. Atalla ,

722-744: The European Commission will strengthen and unify data protection for individuals within the EU, whilst addressing the export of personal data outside the EU. The four types of technical safeguards are access controls, flow controls, inference controls, and data encryption . Access controls manage user entry and data manipulation, while flow controls regulate data dissemination. Inference controls prevent deduction of confidential information from statistical databases and data encryption prevents unauthorized access to confidential information. Online transaction processing Online transaction processing ( OLTP )

760-623: The Interchange Identikey. It added the capabilities of processing online transactions and dealing with network security. Designed with the focus of taking bank transactions online , the Identikey system was extended to shared-facility operations. It was consistent and compatible with various switching networks , and was capable of resetting itself electronically to any one of 64,000 irreversible nonlinear algorithms as directed by card data information. The Interchange Identikey device

798-563: The appropriate measures to reduce the risk of unauthorized disclosure of consumers’ private information. The international standards ISO/IEC 27001 :2013 and ISO/IEC 27002 :2013 cover data security under the topic of information security , and one of its cardinal principles is that all stored information, i.e. data, should be owned so that it is clear whose responsibility it is to protect and control access to that data. The following are examples of organizations that help strengthen and standardize computing security: The Trusted Computing Group

SECTION 20

#1732855968650

836-604: The core earnings margin for the mature assets in the deal - about 80 percent of the total - from 21 percent today to Micro Focus's existing 46 percent level within three years." The merger concluded on September 1, 2017. On 18 May 2018, Utimaco, a German producer of hardware security modules, announced its intent to acquire the Atalla HSM and ESKM (Enterprise Secure Key Manager) business lines from Micro Focus . The venture received United States regulatory clearance in October 2018. Atalla

874-425: The data to make it unrecoverable, making the system unusable. Hardware-based security solutions prevent read and write access to data, which provides very strong protection against tampering and unauthorized access. Hardware-based security or assisted computer security offers an alternative to software-only computer security. Security tokens such as those using PKCS#11 or a mobile phone may be more secure due to

912-416: The data and updating existing data to reflect the collected and processed information. As of today, most organizations use a database management system to support OLTP. OLTP is carried in a client-server system. Online transaction process concerns about concurrency and atomicity. Concurrency controls guarantee that two users accessing the same data in the database system will not be able to change that data or

950-604: The faster, more accurate forecast for revenues and expenses are both examples of how OLTP makes things simpler for businesses. However, like many modern online information technology solutions, some systems require offline maintenance, which further affects the cost-benefit analysis of an online transaction processing system. An OLTP system is an accessible data processing system in today's enterprises. Some examples of OLTP systems include order entry, retail sales, and financial transaction systems. Online transaction processing systems increasingly require support for transactions that span

988-426: The first hardware security module (HSM), dubbed the "Atalla Box", a security system which encrypted PIN and ATM messages, and protected offline devices with an un-guessable PIN-generating key . He commercially released the "Atalla Box" in 1973. The product was released as the Identikey. It was a card reader and customer identification system , providing a terminal with plastic card and PIN capabilities. The system

1026-691: The hardware and the firmware secure loader. This approach creates a security platform able to load secure code. Once control passes from the loader, the module is no longer operating in FIPS mode. Note: that no personality will have access to the module's secret keys. The cryptographic boundary of the ACS for the FIPS 140-2 Level 3 validation is the outer perimeter of the secure metal enclosure that encompasses all critical security components. Data security Disk encryption refers to encryption technology that encrypts data on

1064-463: The inventor of the MOSFET (metal–oxide–semiconductor field-effect transistor). In 1972, Atalla filed U.S. patent 3,938,091 for a remote PIN verification system, which utilized encryption techniques to assure telephone link security while entering personal ID information, which would be transmitted as encrypted data over telecommunications networks to a remote location for verification. He invented

1102-715: The market, banks and credit card companies began working on an international standard . The work of Atalla led to the use of high security modules. Its PIN verification process was similar to the later IBM 3624 system. Atalla was an early competitor to IBM in the banking market, and was cited as an influence by IBM employees who worked on the Data Encryption Standard (DES). At the National Association of Mutual Savings Banks (NAMSB) conference in January 1976, Atalla announced an upgrade to its Identikey system, called

1140-426: The physical access required in order to be compromised. Access is enabled only when the token is connected and the correct PIN is entered (see two-factor authentication ). However, dongles can be used by anyone who can gain physical access to it. Newer technologies in hardware-based security solve this problem by offering full proof of security for data. Working off hardware-based security: A hardware device allows

1178-420: The processing of large numbers of concurrent updates to an OLTP-oriented database. For even more demanding decentralized database systems, OLTP brokering programs can distribute transaction processing among multiple computers on a network . OLTP is often integrated into service-oriented architecture (SOA) and Web services . Online transaction processing (OLTP) involves gathering input information, processing

Utimaco Atalla - Misplaced Pages Continue

1216-450: The realm of computers or database transactions it denotes an atomic change of state, whereas in the realm of business or finance, the term typically denotes an exchange of economic entities (as used by, e.g., Transaction Processing Performance Council or commercial transactions . ) OLTP may use transactions of the first type to record transactions of the second. OLTP is typically contrasted to online analytical processing (OLAP), which

1254-516: The software assets of Hewlett Packard Enterprise, including Atalla, would be spun out and then merged with Micro Focus to create an independent company of which HP Enterprise shareholders would retain majority ownership. Micro Focus CEO Kevin Loosemore called the transaction "entirely consistent with our established acquisition strategy and our focus on efficient management of mature infrastructure products" and indicated that Micro Focus intended to "bring

1292-483: The system responds immediately to user requests. An automated teller machine (ATM) for a bank is an example of a commercial transaction processing application. Online transaction processing applications have high throughput and are insert- or update-intensive in database management. These applications are used concurrently by hundreds of users. The key goals of OLTP applications are availability, speed, concurrency and recoverability ( durability ). Reduced paper trails and

1330-405: The user has to wait until the other user has finished processing, before changing that piece of data. Atomicity controls guarantee that all the steps in a transaction are completed successfully as a group. That is, if any steps between the transaction fail, all other steps must fail also. To build an OLTP system, a designer must know that the large number of concurrent users does not interfere with

1368-416: The user privilege levels. A hacker or a malicious program cannot gain access to secure data protected by hardware or perform unauthorized privileged operations. This assumption is broken only if the hardware itself is malicious or contains a backdoor. The hardware protects the operating system image and file system privileges from being tampered with. Therefore, a completely secure system can be created using

1406-405: Was designed to let banks and thrift institutions switch to a plastic card environment from a passbook program. The Identikey system consisted of a card reader console, two customer PIN pads , intelligent controller and built-in electronic interface package. The device consisted of two keypads , one for the customer and one for the teller. It allowed the customer to type in a secret code, which

1444-502: Was released in March 1976. It was one of the first products designed to deal with online transactions, along with Bunker Ramo Corporation products unveiled at the same NAMSB conference. In 1979, Atalla introduced the first network security processor (NSP). In recognition of his work on the PIN system of information security management , Atalla has been referred to as the "Father of the PIN" and as

#649350