Trusted computing and TPM-enhanced software - Essay Example

Comments (0) Cite this document
The Trusted Computing Group, with the intention of providing safety for organizational data, started the company. The company is for this reason in…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.1% of users find it useful
Trusted computing and TPM-enhanced software
Read TextPreview

Extract of sample "Trusted computing and TPM-enhanced software"

TRUSTED PLATFORM MODULE ENHANCED SOFTWARE al Affiliation TPM-enhanced software plays an important role in safeguarding sensitive information and data of major companies and institutions. The Trusted Computing Group, with the intention of providing safety for organizational data, started the company. The company is for this reason in possession of ample data that must be safeguarded from any form of leakage or damage. In my opinion, the organization has played a significant role in ensuring the security of data and information belonging to major companies (Kim, 2009, p. 5). However, there exist numerous flaws and limitations associated with the organization, making it less efficient. Trusted Platform Module is not entirely competent in safeguarding computer systems from the associated threats in the modern world.
Trusted Platform Module enhanced software entails securing the software part of a computer device, such as the generation of cryptographic keys. It ensures that the systems software is safe and convenient for use. Another software aspect is the random number generator, which eases the use of computer programs. The software of any computerized device is readily usable, easing the operation of the systems. TPM-enhanced software enables binding, which is the encryption of data using a bind key. It is from the storage key that the bind key arises. The TPM-enhanced software also allows sealing, which is the encryption of data, similar to binding.
Operating on such a scale creates room for significant limitations and backlashes. The associated limitations result in major failures in the software of the computer system, which to my opinion is the cause of system failure. Numerous accusations exist, resulting in lack of trust in the system. Some of the associated failures include the accusation by Cambridge’s Ross Anderson that Trusted Computing is anticompetitive in its quest of locking users in the enforcement of DRM (Kim, 2009, p. 6).
In my opinion, the invasion of privacy is among the failures of the system, for this reason limiting the success of Trusted Platform Module enhanced software as a system security platform for computer software. I believe that the scheme has not been able to safeguard computer software safely, without having to affect the user’s usage of the machine. Privacy invasion affects the user’s trust in the system since he or she has to remain watchful as they use their computerized systems.
The TPM- enhanced software entails integrity measurement, reporting, and storage. The company, therefore, has access to the user’s whereabouts and intentions. Third parties can also access the users’ private information in the case of leakage. The system does not provide a guarantee over such cases of leakage, for this reason limiting the efficiency of the TPM-enhanced software. The system is also in control of the user’s browsing habits and most proffered websites.
As depicted in the paper, Trusted Computing has significant limitations despite its significance. The system has played a critical role as an important computer software systems. However, the accessibility of a user’s personal information is hazardous in case of leakage. The system does not account for such losses and leakages. For the betterment of the system, there must be an account of prevention measures in case of information leakage. Trusted Platform Module enhanced software must also ensure that it does not invade the user’s private information. It will help in maximizing the trust of its users to the system. Without such elaborate measures, the organization may lack to satisfy the demand of the clients fully. Despite these significant limitations, Trusted Platform Module enhanced software has played a significant role in ensuring the safety of computer software systems for all of its users.
Reference List
Kim, R., 2009. Trusted Platform Module and Privacy: Promises and Limitations. Auckland: University of Auckland.
. Read More
Cite this document
  • APA
  • MLA
(“Trusted computing and TPM-enhanced software Essay”, n.d.)
Trusted computing and TPM-enhanced software Essay. Retrieved from
(Trusted Computing and TPM-Enhanced Software Essay)
Trusted Computing and TPM-Enhanced Software Essay.
“Trusted Computing and TPM-Enhanced Software Essay”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Trusted computing and TPM-enhanced software

Compare and Contrast three separate and distinct linux vendors of workstation and server

...looking for better alternatives. In this regards, Linux is one of the most preferred options due to certain advantages possessed over Microsoft. For instance, Linux is an open source and free software which provided customers the opportunity to develop the visualization mechanisms to enhance the performances. Furthermore, Microsoft consumers who did not posses volume licensing agreement were not allowed to install software in virtual machines running on the same organizations. However, with Linux, users can deploy purchased software to multiple machines with no additional cost (Gabriel Consulting Group Inc, 2009). Thesis Statement The study will provide a contrasting...
14 Pages(3500 words)Essay

TPM components, TPM keys

...? Trusted Platform Module Components and Keys (Insert Trusted Platform Module Components and Keys TPM can be defined as “a computer chip that can securely store artifacts used to authenticate the” computer. The artifacts may include passwords, encryption keys or certificates. Platform measurements which ensure that help ensure that the computer remains trustworthy can also be stored using a TPM. The necessary steps for ensuring that computing in all environments is safe are authentication and attestation. Authentication is simply ensuring that what the computer claims to be can be proven....
4 Pages(1000 words)Research Paper

Computing systems.Emerging Trends in Software Development:Cloud Computing

...?DQ1: Inevitable Change Computing systems are living things. Maybe they aren’t biological like plants and animals but change is a necessary action, just like science shows us evolution is necessary in natural science. Unlike Hal in 2001 A Space Odyssey however, the computer is dependent on its human operators to update and change it software. So it stands to reason that the more complex the system, the more complex the software and probably the more often it requires updates. As Professor Williams points out in his paper (Williams 2009), this is especially true for a system that has been operating for some time (late in its life cycle), even though may be working quite...
3 Pages(750 words)Essay

Hnd Computing And Software Engineering

...HND COMPUTING AND SOFTWARE ENGINEERING Provision of office solutions, automations of different equipment and installation of Internet is a task that is very complicated to fulfill the need in the aforementioned premises. In this case, handling of this task should be done in a manner that is carefully executed and should be analyzed well. In providing networks in a certain institute consisting three branches, there are a lot of things that should be considered in order to have these things done. Analysis of the factors such as locations, availability of equipments, the proximity, the manpower to maintain the set-up and the needed materials to execute the proposal is indeed vital in this case. If we are to...
10 Pages(2500 words)Essay


...mature in the computer industry since the advent of wireless broadband and mobile phones has led to an explosion in how people use wireless networks and are able to communicate using computer networks of various types. It is important to note that despite the importance of networks, a network would be useless without the underlying support system of hardware, software and communication protocols which have to be defined before two computers can communicate with each other in a meaningful way. Additionally, the information on the networks, especially the internet is designed and developed for humans and computers themselves can not understand or react to...
9 Pages(2250 words)Essay

The Trusted Traveler Program

...Essay of my Choice This paper is about the “Trusted Traveler” Program that is making the rounds of the American airports at the moment. It studies the benefits of this program, its disadvantages as well as controversies and legal issues surrounding it. The "Trusted Traveler" Program came in to its own when it was proposed by the Association of Corporate Travel Executives which allowed the facility to frequent fliers as they could be bypassed from lengthy security lines and checks if they carried an l. D. card with them which would show that they have already undergone a federally approved background inquiry and inspection. The “Trusted Traveler" program in essence was made to facilitate the frequent flyers that could include all... the...
4 Pages(1000 words)Essay

Computing and software engineering :object oriented modelling

...accordingly for keeping the records safe to protect against unforeseen disasters (Navathe, 2002). Network security: It can be ensured using the network applications that take care of digital data communication and security must be enforced for safeguarding them against malicious programs. a. Firewalls It is a device which permits, restricts computer traffic in accordance to the security policies enforced in the business rules. Firewalls are either implemented through hardware, software, or both. They work best in detecting attacks that could enter or leave your system through an open port, such as worms and some Trojan horses. They do not scan the fragmented packets so in that way malwares attached to...
8 Pages(2000 words)Essay

Enhanced Learning

.... Hence, enhanced learning procedures allow the students and all individuals in general to learn things in an interesting way. In depth learning paths are formed and one starts building conclusions on the various evidences found. This further allows the individual to publish their research and findings for other professionals in the same field. Work Cited Carneiro, Roberto. Self-Regulated Learning in Technology Enhanced Learning Environments. Springer, 2011. Print. Xhafa, Fatos. Computational Intelligence for Technology Enhanced Learning. Barcelona: Springer, 2013. Print.... Number] Enhanced Learning Many teachers confronts difficulties in upholding academic levels in today’s bigger and more diversified learning sessions....
2 Pages(500 words)Essay

The downside of trusted computing

...for its possessor as well as to secure it against its holder. Other related issues comprise of the exploitation of validation of software remotely. In this case, the maker and not the client who possesses the computer system make a decision on what software would be permitted to run ("Weighing the pros and cons of the Trusted Computing Platform," n.d.). Another concern is that client action in these circumstances might be recorded in a proprietary database without the knowledge of the user. In this case, user privacy happens to be an issue as well as forming a security acquiescence conflict. Designs that exist are essentially damaged since they expose...
1 Pages(250 words)Essay

DRM and trusted computing

...with the network traffic (Reid & Caelli 2005, p. 129). The Https is efficient because of the safe sockets layer (SSL) facility that shields the web-based network interchange from unauthorized users. The Https also uses certificates that can prove the identity of the servers a computer is interacting with over the internet (Strebe 2006, p. 18-23). List of References Lockhart, A. (2007). Network security hacks. Beijing: OReilly. Print. Luettmann, B., & Bender, A. (2009). Man-in-the-middle attacks on auto-updating software. Bell Labs Technical Journal, 3(2), 131-138. Luotonen, A. (1998). Web proxy servers. Upper Saddle River, Nj: Prentice Hall. Print. Reid, J., & Caelli, W. (2005). “DRM,...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Trusted computing and TPM-enhanced software for FREE!

Contact Us