The downside of trusted computing - Essay Example

Comments (0) Cite this document
Practically, trusted computing utilizes cryptography to aid in enforcing a chosen behavior ("Weighing the pros and cons of the…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.4% of users find it useful
The downside of trusted computing
Read TextPreview

Extract of sample "The downside of trusted computing"

The downside of trusted computing College In spite of the many principles concerning the safety of trusted computing, the design has brought up some concerns over privacy and functionality. Practically, trusted computing utilizes cryptography to aid in enforcing a chosen behavior ("Weighing the pros and cons of the Trusted Computing Platform," n.d.). The major feature of trusted computing is to permit someone else to authenticate that only certified code runs on a system. Remember, trusted computing when used alone does not guard against attacks that abuse security susceptibilities set up by programming bugs.
The problem comes up with the main purpose of the chip. It is technically achievable with trusted computing, to protect the hardware for its possessor as well as to secure it against its holder. Other related issues comprise of the exploitation of validation of software remotely. In this case, the maker and not the client who possesses the computer system make a decision on what software would be permitted to run ("Weighing the pros and cons of the Trusted Computing Platform," n.d.). Another concern is that client action in these circumstances might be recorded in a proprietary database without the knowledge of the user. In this case, user privacy happens to be an issue as well as forming a security acquiescence conflict.
Designs that exist are essentially damaged since they expose the public to new dangers of anti-consumer as well as anti-competitive behavior. Although the hardware is employed as per published specifications, it can still be utilized in a manner that harms computer possessors. Second, makers of certain trusted computers as well as components may surreptitiously implement them wrongly ("Weighing the pros and cons of the Trusted Computing Platform," n.d.).
Hardware enrichments may be one technique to develop computer safety ("Trusted Computing: Promise and Risk | Electronic Frontier Foundation," n.d.). Treating computer holders as enemies is not growth in computer security. The owner control, interoperability and competition as well as similar issues intrinsic to the NCSCB and TCG approach are very serious that we advocate against embracing these trusted computing technologies up to the time these issues have been tackled.
Weighing the pros and cons of the Trusted Computing Platform. n.d.. Retrieved from
Trusted Computing: Promise and Risk | Electronic Frontier Foundation. n.d.. Retrieved from Read More
Cite this document
  • APA
  • MLA
(“The downside of trusted computing Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
The downside of trusted computing Essay Example | Topics and Well Written Essays - 250 words. Retrieved from
(The Downside of Trusted Computing Essay Example | Topics and Well Written Essays - 250 Words)
The Downside of Trusted Computing Essay Example | Topics and Well Written Essays - 250 Words.
“The Downside of Trusted Computing Essay Example | Topics and Well Written Essays - 250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF The downside of trusted computing

Trusted computing base / Business reasons for a BCP and a DRP

...? Number: Lecturer The concept of a “trusted computing base” Trusted computing base was first defined by as the combination of kernel and trusted process that allow violation of the systems access and control regulations (Rushby, 1981). Lampson further defined it as a small amount of software and hardware that security depends on and that we distinguish from a much larger amount that can misbehave without affecting security (B. Lampson, 1992). From these two definitions therefore, trusted computing base can be terminology in computer security meaning a set of all the components including hardware, software, procedures and all other relevant components that are critical and essential to enforcing the security of the entire system... . In...
2 Pages(500 words)Research Paper

Downside Risk to Real Estate

...Downside Risk in REIT - A Dissertation Affiliation: Cambridge Contact: March 2, Version 1 It is fairly well propagated concept from Economists for a significantly long time that investors care differently about downside losses versus upside gains. All stakeholders that place greater weight on downside risk demand additional compensation for holding stocks with high sensitivities to downside market movements. The cross-section of stock returns reflects a premium for downside risk and it is specifically, those stocks that covary strongly with the market when the market declines that have high average returns. While examining the historical financial data for publicly traded securities issued by Real Estate Investment Trusts (REIT... . This...
21 Pages(5250 words)Essay


...Many tools are available to monitor and control large IT projects. They are project selection and reselection, project scheduling, estimating, and budgeting, planning, project team management and selection, stakeholder management, management support, procurement management, learning and knowledge management, and risk management. Project selection and reselection is one of the tools in the monitoring and control of large IT projects. Although Yetton (2000) uses this as an indication of how successful projects have been monitored and controlled, several other scholars (Cai et al., p. 1-22) use it as an independent variable. Project selection is the procedure of approving or rejecting projects. Project benefits are weighted... tools are...
6 Pages(1500 words)Assignment


... ComputingComputability Theory The field of computer science deals with the idea of computability theory which looks at mathematical and logical problems by examining their solvability. In essence it examines if a problem can be positively handled by a logic machine or not. In even simpler terms, computability theory works at the very limits of computing power so while we can expect computers today to be very powerful and complex machines; there are certain limits to the problems they can solve. In certain situations, computability theory suggests that specialized computers might be...
9 Pages(2250 words)Essay

The Trusted Traveler Program

...Essay of my Choice This paper is about the “Trusted Traveler” Program that is making the rounds of the American airports at the moment. It studies the benefits of this program, its disadvantages as well as controversies and legal issues surrounding it. The "Trusted Traveler" Program came in to its own when it was proposed by the Association of Corporate Travel Executives which allowed the facility to frequent fliers as they could be bypassed from lengthy security lines and checks if they carried an l. D. card with them which would show that they have already undergone a federally approved background inquiry and inspection. The “Trusted Traveler" program in essence was made to facilitate the frequent flyers that could include all... the...
4 Pages(1000 words)Essay


...; employed for voice communication as well as TV, correspondingly. Fiber optics based communication and transmission medium engages installing the entire new fiber optic cables, complete set of little fibers of glass, consequently DSL is possible to be the existing choice for the majority informal Internet clients intended for a number of periods (Hintzr, 2010; Nash, 2000; Shelly et al., 2005). 6.3- Equipment and Installation Together DSL, communication and transmission medium normally utilize a modem or else router to interface through computers as well as additional Internet devices. DSL as well necessitates that voice devices in the home areas be ended by diverse filters to stop their dawdling the fastest DSL...
12 Pages(3000 words)Essay


...The LZ encoding was developed in 1984 and has been identified as simple to implement due to its compatibility with hardware. Its purpose is to compress large English language documents. The encoding has been used in PDF files and allows the reduction of the size of a document. The compiler can be said to be a program used in the translation of computer language (Layton, 2007). It simplifies the original language of information into another language, normally easy to understand. An example of a compiler is the JAVA software. Applications software is a class of software used to perform a specified function. An office suite is an application used for editing written documents. Another example is a media player whose...
2 Pages(500 words)Coursework

The Downside of Diversity

...The Downside of Diversity” In these modern times, diversity is often thought of as a good thing. This is mainly derived from the negative past experiences with racial segregation, so it is naturally assumed that we now must promote multiculturalism in our communities. In “The downside of diversity,” Michael Jonas argues for completely the opposite point of view. Studies carried out by Jonas shows that diversity is not all it is talked up to be. Although diversity is thought of as a positive thing for society, Putnam’s study proves that diversity produces lower civic health, a decline in social capital, and brings out the turtle in all of us. Diversity produces lower civic health, which is a detriment to...
2 Pages(500 words)Essay

Trusted computing and TPM-enhanced software

...TRUSTED PLATFORM MODULE ENHANCED SOFTWARE al Affiliation TPM-enhanced software plays an important role in safeguarding sensitive information and data of major companies and institutions. The Trusted Computing Group, with the intention of providing safety for organizational data, started the company. The company is for this reason in possession of ample data that must be safeguarded from any form of leakage or damage. In my opinion, the organization has played a significant role in ensuring the security of data and information belonging to major companies (Kim, 2009, p. 5). However, there exist numerous flaws and limitations associated with the organization, making it less efficient....
2 Pages(500 words)Essay

DRM and trusted computing

...DRM AND TRUSTED COMPUTING The setup in which trusted computing when used to enforce DRM is vulnerable to man in the middle attacks (MitM) because of the ARP spoofing. This occurs when an authorized user causes network traffic between computers communication over the internet (Lockhart 2007, p. 84). As a result, the trick user is able to monitor the data shared between the communicating victims. This is dangerous since it exposes confidential information to the trick user, which might lead to access to personal and important information (Reid & Caelli 2005, p. 127). This is because the attacker has the freedom to interrupt data frames on a system,...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic The downside of trusted computing for FREE!

Contact Us