StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Trust computing - Essay Example

Cite this document
Summary
Machine authentication in a trusted computing system utilizes machine credentials such as machine name and machine certificate or password to authenticate the endpoint. Organizations have a mandate of controlling individuals who are able to access resources and corporate…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95% of users find it useful
Trust computing
Read Text Preview

Extract of sample "Trust computing"

Machine authentication By Machine authentication in a trusted computing system utilizes machine credentials such as machine name and machine certificate or password to authenticate the endpoint. Organizations have a mandate of controlling individuals who are able to access resources and corporate networks. They also control and identify which servers and machines are to be accessed. Implementation of machine authentication ensures that only machines with credentials that are considered appropriate can operate, communicate and access corporate networks.

Machine authentication offers organizations a cost effective and easier way for accessing and securing organizational data. One of the benefit of machine authentication is that it enables information within the active directory to issue optionally configured and template based certificate automatically to all servers and machines residing within a multiple or single domains in a multiple or single forest configuration ( sun et al, 2012). Other benefits of machine authentication entails preventing rogue machines from accessing organizational resources and networks, allowing mutual server and machine authentication between the various machines, being scalable and cost effective for organizations of all sizes and identifying the servers and machines having access to various networks.

Machine authentication enables users to possess a log on script (Anwander et al, 2013). The experience is often transparent as the log in process is performed in the normal way. It also ensures automatic issuance and enrollment of certificates. Computer or machine authentication takes place before windows can display the CTRL + ALT + DEL screen. It does not occur when members of organization utilize their domain credentials on their own computers or other window devices. Implementation of machine authentication will enable organizations to have control over access to resources.

Reference Anwander, M., Braun, T., Hurni, P., Staub, T., & Wagenknecht, G. 2013. User and Machine Authentication and Authorization Infrastructure for Distributed Wireless Sensor Network Testbeds. JSAN, 2(1), 109-121. doi:10.3390/jsan2010109Sun, X., Men, S., Zhao, C., & Zhou, Z. 2012. A security authentication scheme in machine-to-machine home network service. Security Comm. Networks, n/a-n/a. doi:10.1002/sec.551

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Trust computing Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Trust computing Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1676102-trust-computing
(Trust Computing Essay Example | Topics and Well Written Essays - 250 Words)
Trust Computing Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1676102-trust-computing.
“Trust Computing Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1676102-trust-computing.
  • Cited: 0 times

CHECK THESE SAMPLES OF Trust computing

What Competition Does Novosco Face in the UK Cloud Technologies

focuses on a business report on Novosco, which, reportedly, is the UK-based company that researches and deals with cloud computing and IT infrastructure services.... hellip; There is competition in the number of specialist engineers that the cloud computing and IT infrastructure companies will be using to serve their clients (Gosling 2013, p.... The competition will be in the field of internet connectivity, the supply of cloud computing, transfer of data, servicing multiple sites among other domains....
9 Pages (2250 words) Case Study

Cloud Computing Security Models

Cloud computing is known for its efficiency and flexibility in producing services that are able to meet the escalating business needs.... Cloud computing has a wide range of benefits but it also encounters issues regarding security such as application security, access control, virtualization security, identity management and authentication.... … Abstract Cloud computing is known for its efficiency and flexibility in producing services that are able to meet the escalating business needs....
5 Pages (1250 words) Essay

Law of Trusts and Advise to Teresa

In the law of Equity and trust, any trustee is entitled to make decision on investment of the beneficiaries.... However if Teresa finds that her dislike to the children is affecting the trust, then she can apply to the court for requiting her post as a trustee and the court shall appoint a trustee to run the fund.... Therefore, Teresa should not give out the money to Austin simply because, he (Austin) is a minor and in any case the money is held in trust for their benefits and not his own benefit....
8 Pages (2000 words) Case Study

Cloud-Based Computing Security

The paper "Cloud-Based computing Security" highlights that Data security, in particular data protection from unauthorized access, is becoming more crucial as an increasing number of enterprises trust their database systems.... nbsp;It is obvious that cloud computing helps IT organizations.... evelopments in networking technology and an increase in the need for computing resources have encouraged many enterprises to outsource their storage and computing needs....
7 Pages (1750 words) Essay

The downside of trusted computing

Practically, trusted computing utilizes cryptography to aid in enforcing a chosen behavior ("Weighing the pros and cons of the… The major feature of trusted computing is to permit someone else to authenticate that only certified code runs on a system.... Remember, trusted computing when used alone does not guard against attacks that abuse security susceptibilities set up by The downside of trusted computing College In spite of the many principles concerning the safety of trusted computing, the design has brought up some concerns over privacy and functionality....
1 Pages (250 words) Essay

Trusted computing and TPM-enhanced software

The Trusted computing Group, with the intention of providing safety for organizational data, started the company.... The Trusted computing Group, with the intention of providing safety for organizational data, started the company.... Some of the associated failures include the accusation by Cambridge's Ross Anderson that Trusted computing is anticompetitive in its quest of locking users in the enforcement of DRM (Kim, 2009, p.... As depicted in the paper, Trusted computing has significant limitations despite its significance....
2 Pages (500 words) Essay

DRM and trusted computing

This is DRM AND TRUSTED computing The setup in which trusted computing when used to enforce DRM is vulnerable to man in the middle attacks (MitM) because of the ARP spoofing.... 128), trusted computing is vulnerable to MitM attack when used to enforce DRM if the attacker acts as a proxy between two communicating users.... n order to avoid the vulnerability of trusted computing to MitM attacks when enforcing DRM, it is advisable for communicating computers to use encrypted network connections....
1 Pages (250 words) Essay

The Essence of a Trust

From the paper "The Essence of a trust" it is clear that Astrid's claims of the contents in the safety box and Lake View are to be upheld, as there is the certainty of the object in the letter sent to the trustee indicating the property was to be held on trust for her.... A fundamental aspect of a trust is an obligation owed by the trustee to the beneficiaries, and that is enforceable.... The duty to act and perform the trust honestly and in good faith forms the minimum basis that gives substance to the trust....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us