Home Products Hardware Security Evaluation Laboratory

Hardware Security Evaluation Laboratory

Download PDF

Additional information

INTRODUCTION

Compromising emanations are defined as unintentional intelligence bearing signals data related or revealing information which, if intercepted and analyzed, disclose the classified and security information transmitted, received, handled or otherwise processed by any information-processing equipment. Therefore, the main objectives of hardware security evaluation laboratory include following:

  • Determining the security requirements applicable to a given system.
  • Measuring the extent to which the system satisfies its applicable security requirement and introduces residual risk.

SERVICES

  • Hardware Evaluation
    • Detecting spyware by the analysis of system on Board and chip level.
    • Hardware system security assessment in the level of revision of System, Board and Chip based on methodologies developed.
    • Hardware systems safety assessment in terms of malfunction of other devices.
    • Safety assessment in terms of robustness against interference in operational areas.
    • Validating the performance of equipment based on determining the originality of parts.
  • Propagation Evaluation
    • Security assessment of the propagation of equipment and providing a safe zone for equipment.
    • Security assessment of the propagation of side channel in encryption systems.
    • Security assessment of systems in terms of propagation power.
    • Monitoring system within a specified time in terms of propagation.
  • Protocol Evaluation
    • Designing the attack scenario and protocol penetration testing.
    • Protocol security evaluation according to the studying of protocol and conceptual analysis of system security.
    • The initial assessment of protocol security according to threat reported.
    • Documentation and classification of protocol security level based on provided documents.

CAPABILITIES

  • Handling hardware security training courses, such as EMC and TEMPEST Learning.
  • Designing, mobilizing and setting up Hardware Security Evaluation Laboratory.
  • Designing and building security room for critical data processing center.
  • Defining security requirements for specific system from design to production.

Similar products

HRC-610/E Handheld Multi-Band Radio Communication System

HRC-610/E Handheld Multi-Band Radio Communication System

VRC-411/E Direct Sequence Spread Spectrum Vehicular Radio Communication System

VRC-411/E Direct Sequence Spread Spectrum Vehicular Radio Communication System

VRC-220/E Vehicular Radio Communication System

VRC-220/E Vehicular Radio Communication System

PRC-120/E Portable Radio Communication System

PRC-120/E Portable Radio Communication System

VRC-131/E Vehicular Radio Communication System

VRC-131/E Vehicular Radio Communication System

TRC-421/E Transportable Radio Communication System

TRC-421/E Transportable Radio Communication System

BAT-311/E Battlefield Automatic Telephone

BAT-311/E Battlefield Automatic Telephone

ARC-620/E Airborne Radio Communication System

ARC-620/E Airborne Radio Communication System

SDH-930/E Synchronous Digital Hierarchy System

SDH-930/E Synchronous Digital Hierarchy System

MRC-310/E Marine Radio Communication System

MRC-310/E Marine Radio Communication System

GRC-620/E Ground-Base Radio Communication System

GRC-620/E Ground-Base Radio Communication System

ATC-720/E Air Traffic Control Tower

ATC-720/E Air Traffic Control Tower

DTN-910/E Digital Trunk Network

DTN-910/E Digital Trunk Network

WTM-210/E Winch Telescopic Mast

WTM-210/E Winch Telescopic Mast

IPD42(G)/E Civil Handheld Radio

IPD42(G)/E Civil Handheld Radio

IRD62/E Mobile Radio Repeater

IRD62/E Mobile Radio Repeater

VIS-320/E Vehicular Intercommunication System

VIS-320/E Vehicular Intercommunication System

Secure USB Storage

Secure USB Storage

Short Range Non-Linear Junction Detector

Short Range Non-Linear Junction Detector

Mobile microphone jammer

Mobile microphone jammer

Long Range Non-Linear Junction Detector

Long Range Non-Linear Junction Detector

Enterprise Resource Planning

Enterprise Resource Planning

PRC-220/E Portable Radio Communication System

PRC-220/E Portable Radio Communication System

MRC-110/E Marine Radio Communication System

MRC-110/E Marine Radio Communication System

RCS-940/E Radar Communications System

RCS-940/E Radar Communications System

IMD52(G)/E Civil Vehicular Radio

IMD52(G)/E Civil Vehicular Radio

SOC-910/E Sector Operation Center

SOC-910/E Sector Operation Center

Armored Radio/Intercommunication System

Armored Radio/Intercommunication System

NSD-1811/E & NSD-1871/E Network Security Device

NSD-1811/E & NSD-1871/E Network Security Device

Manufacturing and Supplying Various Types of Fiber Optic Cables

Manufacturing and Supplying Various Types of Fiber Optic Cables

Internet Network Monitoring System

Internet Network Monitoring System

Secure Mobile SM60

Secure Mobile SM60

Computer Emergency Response Team CERT

Computer Emergency Response Team CERT

Data Recovery Lab

Data Recovery Lab

Admin Control System

Admin Control System

Android Monitoring System

Android Monitoring System

DANA

DANA

Laptop Tracker

Laptop Tracker

Wi-Fi Monitoring System

Wi-Fi Monitoring System

ISIRAN Information Systems Iran

ISIRAN Information Systems Iran

System Architecture (SA) (C4I)

System Architecture (SA) (C4I)

C&C GIS Geographic Information Systems base Command and Control

C&C GIS Geographic Information Systems base Command and Control

DMS Document Management System

DMS Document Management System

CMMS Computerized Maintenance Management System

CMMS Computerized Maintenance Management System

Data center and Network

Data center and Network

E-Payment (E-Pay)

E-Payment (E-Pay)