Our website is a unique platform where students can share their papers in a matter of giving an example of the work to be done. If you find papers
matching your topic, you may use them only as an example of work. This is 100% legal. You may not submit downloaded papers as your own, that is cheating. Also you
should remember, that this work was alredy submitted once by a student who originally wrote it.
The writer of the paper “Trusted Computing” states that TC offers intelligent application solutions for leveled coding but may or may not include the same level firewall regarding port 139 password protection, remote computer interruption, and blacklist IP/blocking technology…
Download full paperFile format: .doc, available for editing
COMPUTING Trusted Computing, or TC, is a technology that has recently been pioneered by the Trusted Computing Group, a private company which views TC as a proprietary system. The system is basically about coding and monitoring the overall computing system, and is being developed as an effective security platform as well. The field basically comes out of trusted systems, a branch of computing that is also relatively recent, and the meaning of TC is individuated. To fully understand TC, one has to think of what it means for a system to be trusted: it means that the system must be predictable under given conditions, and also must be secure from threats in today’s ever-evolving networked space. If the system operates in the same manner every time it performs a task, this takes randomness out of the element and forms the basis for the consistency of TC. This consistency is then enforced by hardware and software systems used by the computing system, which is achieved by enforcement through coding. In other words, an indviudal using TC does not have the master key to the system, even if they are the only ones with ownership and knowledge of the trusted system they are using. In trusted computing, not even the owner is a secure and accepted recognized user in TC: the computer is secure in its system in every way imaginable, even from its operator. There are various advantages and disadvantages to consider when using TC.
In terms of the additional hardware that is necessary for TC, a system using this type of technology needs to be equipped with support in BIOS system functions. There is a lot that the coding system of TC does during the computer’s booting process and also before the booting process, which necessitates the use of BIOS which measures the hardware state and then aims for system continuity. As a result of this process, TC is functional in that it, “will "measure" the current hardware state, storing the result in a PCR. The boot loader will also be checksummed, with the result going into another PCR. The boot loader is then run” (Linux, 2008). At this point, the computer is doing its job to check the stash and checksum of the operating system language through the hardware, before actually booting allowing for greater security. Once the computer commences operations, the TC software then interacts and takes charge of the system, providing access and keeping tabs on the status of the system through monitoring functions. Therefore, it can be seen that in terms of hardware, the main support that is needed is for BIOS support. Low level support activity is implemented by a small chip labeled the Trusted Platform Module.
The extra OS functions which TC gives to users include mainly options on Linux at the time of the current investigation, but also Microsoft Windows with third-party software. As mentioned above, at its lowest level, TC is started out by the TPM, which provides the host system connected to the OS. This includes benefits of protected memory in the system, as well as a restricted set of control commands that can be dedicated to the user, and that can also operate on that area through the PCR hashed accumulator. The main function of cryptographic coding and RAM also includes interaction with an OS, whether it is Windows, Linux, pre-loaded software (Intel Classmate), etc. (Anderson, 2008). Security functions interacting with the OS are also important to consider, in terms of most pre-installed OS firewalls operating within this paradigm in a relatively simple way, but generally, the more expensive a firewall system is, the more sophisticated its applications are. Most common firewalls are rather generalized in their port applications.
In terms of pros and cons that the British Army may consider regarding future applications of TC, a consideration of these benefits and drawbacks is important to provide counterpoint. Often in the rapidly-changing high technology environment, there are chalelnges when, “Technology puts too much power and control into the hands of those who design systems and software. They also believe that it may cause consumers to lose anonymity in their online interactions, as well as mandating technologies Trusted Computing opponents deem unnecessary” (Anderson, 2008). However, there are definite benefits to the system as well, since TC protects through coding, and also includes advanced algorithms and applications. There is concern among some critics that TC will lack transparency relative to its hardware components in the future, though, and the proprietary nature of the system raises definitive concerns regarding protected data and existing security conditions. There is also concern that, “the world of cryptography can often move quickly, and that hardware implementations of algorithms might create an inadvertent obsolescence” (Anderson, 2008). The constant evolution of threats in this environment is a concern.
There are many serious threats to network security which can be addressed positively by TC, however, which the British Army may also consider. Considering the diversity of threats, including viruses, worms, hackers, Trojan Horses, spyware, spam, and other variants, there is also opportunity. The threats are evolving because network security increases in importance as the technology developed by hackers and spam makers increases in sophistication over time. The dynamic IT professional of today therefore needs to constantly keep abreast of current industry developments so that the professional’s clients continue to receive the optimum security and care they expect, balanced against privacy issues that are becoming more important as individuals and organizations are worried about things like identity theft and fraud. The British Army needs to realize that protecting the client side of the network is a responsibility that requires creativity and perseverance, especially in an organizational environment in which costs often increase exponentially with constant updates. Therefore it is advisable to know about the many options available regarding competition the client side of the network, so that the IT professional can inform those who may be worried about privacy most effectively, in terms of their options.
This instance shows how security is an issue at all stages of the technology chain. Not only do researchers and scientists need to understand the need for increased security, but they also need to understand that computers can be compromised even when they are thrown away. TC offers intelligent application solutions for leveled coding but may or may not include the same level firewall regarding port 139 password protection, remote computer interruption, and blacklist IP/blocking technology. When it comes to simply protecting ports from attack, however, most firewalls essentially do the same job. Overall, TC shows how IT and network security can present the British Army with both costs and opportunities. There is the possibility of hardware compromise and system backup, or information can become more freely available, allowing the army to communicate faster and more effectively, leading to hypothetical increases in productivity. Although it may not be possible to provide complete network security at the present, the future may see a decrease in the number of loopholes and a convergence of security measures; TC seems to be a part of this drive towards a solution, albeit an incomplete one. The challenge of the future is to integrate dynamic real-world operations.
REFERENCE
Anderson, R (2008). Trusted Computing—FAQ.
http://www.cl.cam.ac.uk/-ria14/tcpa-faq.html
Linux and Trusted Computing (2008). http://lwn.net/Articles/144681/
Trusted Computing Group (2008). https://www.trustedcomputinggroup.org/home
Read
More
Other devices such as network equipment and mobile phones can be computed using TPMs (Trusted Computing Group, 2012).... of the Trusted Computing Group specification; Certifiable migratable keys (CMKs).... Trusted Computing and the Trusted Platform Module: What All the Fuss Is About.... spx Trusted Computing Group (2012).... The necessary steps for ensuring that computing in all environments is safe are authentication and attestation....
The concept of a “Trusted Computing base” Trusted Computing base was first defined by as the combination of kernel and trusted process that allow violation of the systems access and control regulations (Rushby, 1981).... From these two definitions therefore, Trusted Computing base can be terminology in computer security meaning a set of all the components including hardware, software, procedures and all other relevant components that are critical and essential to enforcing the security of the entire system....
A Trusted Computing base (TCB) is a component of a computer system characterized by a set of firmware, hardware, and software elements that serve an important purpose in protecting the computer system.... Explain the concept of the “Trusted Computing Base” and how this is used to provide security within an operating system.
... ased on a careful design and implementation of the Trusted Computing base, the security of an operating system is significantly improved....
Practically, Trusted Computing utilizes cryptography to aid in enforcing a chosen behavior ("Weighing the pros and cons of the.... The major feature of Trusted Computing is to permit someone else to authenticate that only certified code runs on a system.... Remember, Trusted Computing when used alone does not guard against attacks that abuse security susceptibilities set up by The downside of Trusted Computing College In spite of the many principles concerning the safety of Trusted Computing, the design has brought up some concerns over privacy and functionality....
The Trusted Computing Group, with the intention of providing safety for organizational data, started the company.... The Trusted Computing Group, with the intention of providing safety for organizational data, started the company.... Some of the associated failures include the accusation by Cambridge's Ross Anderson that Trusted Computing is anticompetitive in its quest of locking users in the enforcement of DRM (Kim, 2009, p.... As depicted in the paper, Trusted Computing has significant limitations despite its significance....
This is DRM AND Trusted Computing The setup in which Trusted Computing when used to enforce DRM is vulnerable to man in the middle attacks (MitM) because of the ARP spoofing.... 128), Trusted Computing is vulnerable to MitM attack when used to enforce DRM if the attacker acts as a proxy between two communicating users.... n order to avoid the vulnerability of Trusted Computing to MitM attacks when enforcing DRM, it is advisable for communicating computers to use encrypted network connections....
The Trusted Computing Base is the internal network within GFI.... The elements in the GI network include internet segments, remote users, PSTN, Trusted Computing base and workstations.... Using a node, switch, the entire network is connected to the Trusted Computing base internal network.... The Trusted Computing base network houses the critical components including SUS server, Oracle 9I DB server, Internal DNS, Exchange 2000 Email, File and Printer Server, workstations, and intranet web server.
...
Finally there is the Trusted Computing Base Internal network that comprises of the core applications that are regularly used by employees of GFI.... The Oracle server and Email application both are a part of the Trusted Computing base network.... The Trusted Computing base is connected to the rest of the network using an Ethernet router which in turn is connected to a two Ethernet routers and to which the switches of different departments are connected.
...
12 Pages(3000 words)Case Study
sponsored ads
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Trusted Computing"
with a personal 20% discount.