StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The downside of trusted computing - Essay Example

Cite this document
Summary
Practically, trusted computing utilizes cryptography to aid in enforcing a chosen behavior ("Weighing the pros and cons of the…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91% of users find it useful
The downside of trusted computing
Read Text Preview

Extract of sample "The downside of trusted computing"

The downside of trusted computing College In spite of the many principles concerning the safety of trusted computing, the design has brought up some concerns over privacy and functionality. Practically, trusted computing utilizes cryptography to aid in enforcing a chosen behavior ("Weighing the pros and cons of the Trusted Computing Platform," n.d.). The major feature of trusted computing is to permit someone else to authenticate that only certified code runs on a system. Remember, trusted computing when used alone does not guard against attacks that abuse security susceptibilities set up by programming bugs.

The problem comes up with the main purpose of the chip. It is technically achievable with trusted computing, to protect the hardware for its possessor as well as to secure it against its holder. Other related issues comprise of the exploitation of validation of software remotely. In this case, the maker and not the client who possesses the computer system make a decision on what software would be permitted to run ("Weighing the pros and cons of the Trusted Computing Platform," n.d.). Another concern is that client action in these circumstances might be recorded in a proprietary database without the knowledge of the user.

In this case, user privacy happens to be an issue as well as forming a security acquiescence conflict.Designs that exist are essentially damaged since they expose the public to new dangers of anti-consumer as well as anti-competitive behavior. Although the hardware is employed as per published specifications, it can still be utilized in a manner that harms computer possessors. Second, makers of certain trusted computers as well as components may surreptitiously implement them wrongly ("Weighing the pros and cons of the Trusted Computing Platform," n.d.).

Hardware enrichments may be one technique to develop computer safety ("Trusted Computing: Promise and Risk | Electronic Frontier Foundation," n.d.). Treating computer holders as enemies is not growth in computer security. The owner control, interoperability and competition as well as similar issues intrinsic to the NCSCB and TCG approach are very serious that we advocate against embracing these trusted computing technologies up to the time these issues have been tackled.ReferencesWeighing the pros and cons of the Trusted Computing Platform. n.d.. Retrieved from http://searchdatacenter.

techtarget.com/tip/Weighing-the-pros-and-cons-of-the-Trusted-Computing-PlatformTrusted Computing: Promise and Risk | Electronic Frontier Foundation. n.d.. Retrieved from https://www.eff.org/wp/trusted-computing-promise-and-risk

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The downside of trusted computing Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
The downside of trusted computing Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1676112-the-downside-of-trusted-computing
(The Downside of Trusted Computing Essay Example | Topics and Well Written Essays - 250 Words)
The Downside of Trusted Computing Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1676112-the-downside-of-trusted-computing.
“The Downside of Trusted Computing Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1676112-the-downside-of-trusted-computing.
  • Cited: 0 times

CHECK THESE SAMPLES OF The downside of trusted computing

Consultants Report Telecommuting at IBM Indiana

An author of the essay "Consultant's Report Telecommuting at IBM Indiana" outlines that IBM has been famous for their work in their field of computing for years now.... nbsp;… Often referred to as the Big Blue, the IBM Company is renowned for its Services to computing, Information Technology, and consultations....
6 Pages (1500 words) Essay

Importance of Defending Online Privacy in Digital Age

the downside of this convenience is his activities can easily be tracked.... This is done because people trust Internet companies to keep their data secret.... However, revelations of massive spying shows that people's privacy is not respected.... People rely on… These activities produce massive amount of data that NSA and other groups are interested in....
10 Pages (2500 words) Essay

The Application of Cloud Computing in Businesses

This paper "The Application of Cloud computing in Businesses" focuses on the benefits accrued to a business using cloud-computing services are discussed below.... By using cloud-computing platforms, businesses benefit in a number of ways.... nbsp;… Cloud computing is a technology that heralds limitless possibilities for many businesses across the globe.... The application of cloud computing in businesses has a number of benefits and disadvantages to both the clients and providers of the service....
12 Pages (3000 words) Assignment

The Effects of Land Use on Water Quality and Quantity

The paper "The Effects of Land Use on Water Quality and Quantity" discusses that the soil erosion which impacts directly on the water quality will also be reduced when operators deposit the dredged materials away from the sides of the channel before they are removed to industrial, landfill or other locations....
9 Pages (2250 words) Assignment

Risk Assessment in Global Finance Inc

Finally, there is the trusted computing Base Internal network that comprises of the core applications that are regularly used by employees of GFI.... The Oracle server and Email application both are a part of the trusted computing base network.... The trusted computing base is connected to the rest of the network using an Ethernet router which in turn is connected to a two Ethernet router and to which the switches of different departments are connected....
12 Pages (3000 words) Case Study

Business and Technical Challenges for Transitioning Cloud Computing in Blah-Blah Telecoms

From the paper "Business and Technical Challenges for Transitioning Cloud computing in Blah-Blah Telecoms" it is clear that cloud technology can provide great promise for Blah-Blah Telecoms.... Overall, in Blah-Blah Telecoms cloud computing can help to drive innovation and enhance the effectiveness of providing communication services.... Thus, the report will provide information regarding various challenges that require to be considered while embracing cloud infrastructure and also offer recommendations for transitioning cloud computing strategy in the business....
8 Pages (2000 words) Case Study

Communication Advantages

The following paper under the title 'Communication Advantages' presents a Converged communication network that seems to be the way forward in succeeding organizations.... Effective communication improves the efficiency of an organization due to good human relations… Both one-way and two-way communication forms are pivotal in business deliverance....
5 Pages (1250 words) Case Study

Education for Democratic Citizenship within the Multicultural Societies of Europe

This assignment "Education for Democratic Citizenship within the Multicultural Societies of Europe" discusses conflicts and distinctions amongst the people of different castes, races, and creed, the spread of multiculturalism as an effort to build tolerant and a peaceful democratic economy.... hellip; To unwelcome, these riots emerged throughout between the racist and the antiracist factions supporting their beliefs....
1 Pages (250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us