🛡️

Cybersecurity and Memory Management

Jul 10, 2024

Cybersecurity and Memory Management

Introduction to Cybersecurity

  • Focus: Cybersecurity issues related to personal computers (PCs), not necessarily connected to the internet.
  • Future Discussions: Will cover internet-related cybersecurity challenges.

Understanding System Memory

Types of System Memory

  • RAM (Random Access Memory)
    • Measurement: Up to 32 GB for high-end machines; typical range is 4-16 GB.
    • Usage: Stores data temporarily for processing.
  • Hard Drive Space
    • Measurement: Ranges from 128 GB (solid state drives) to 4 TB.
    • Usage: Long-term storage for files and applications.
  • Caches
    • L1, L2, L3 caches: Serve as intermediary storage between RAM and CPU, getting progressively smaller and faster.
    • CPU memory and registers: Fastest but smallest in quantity, located closest to the CPU.

Hierarchy of Memory

  • RAM: Key for processing; must move data to and from RAM to manipulate data.
  • Caches: L3, L2, L1, and CPU memory enable faster data retrieval to CPU.
  • Hard Drives: Non-volatile storage, requiring no power to maintain data.

Memory Addressing

  • 32-bit Systems: Can process memory addresses up to 4 billion.
  • 64-bit Systems: Handle much larger memory addresses, theoretically up to quintillions, allowing for large quantities of RAM.

Memory Representation

  • Binary and Hexadecimal Notations
    • Easier to refer to memory addresses using hexadecimal to save space and simplify representation.
    • Hexadecimal conversion: Groups of 4-binary digits converted to a single hexadecimal digit.
    • Example: Translating binary to hexadecimal and decimal for understanding.
  • Memory Addresses: Organized by bit count (32-bit, 64-bit) to determine how much data can be processed.
  • Practical Example: Use of tools like GDB for debugging and memory management.

Hardware Overview

  • Motherboard Components
    • RAM Slots: For plugging in RAM sticks.
    • CPU: Central Processing Unit, controls processing tasks.
    • Floppy Drive Connectors: Legacy component.
    • SATA Connectors: For connecting hard drives to the motherboard.
    • GPU: For specialized graphic processing.

Volatility and Data Persistence

  • Volatile Memory (RAM): Requires constant power; data lost when power is off.
  • Non-volatile Memory (HDD): Maintains data without power; uses magnetic storage.

Security Concerns and Best Practices

Data Deletion and Recovery

  • Deleting Files:
    • Files aren't truly deleted; system forgets the address but data remains until overwritten.
    • Tools and techniques for data recovery involve reading raw memory sectors for previously stored data.
  • Secure Deletion
    • Physical destruction or tools like degaussers.
    • Overwriting data multiple times for secure deletion due to residual magnetic traces.

Protective Measures

  • Encrypt Hard Drives: Using OS-inbuilt tools for better security.
  • Use Secure Networks: Avoid unsecured networks; consider VPN for secure connections.
  • Password Management: Use strong, unique passwords and consider password managers.
  • Backup Data: Regularly back up data to avoid loss due to hardware failure or cyber-attacks.
  • Implement Compliance Protocols: Establish and follow data management and security policies.

Ethical Considerations for Lawyers

  • ABA Opinion 477R (2017): Emphasizes technical competence and firm compliance protocols.
  • ABA Opinion 483 (2018): Obligation to inform clients of data breaches; importance of data retention policies.

Conclusion

  • Understanding memory management and cybersecurity basics is crucial for protecting data.
  • Implement best practices to comply with ethical guidelines and secure client information.