Features and benefits of trusted computing

  • Authors:
  • Jeff Teo

  • Affiliations:
  • Montreat College, Montreat, North Carolina

  • Venue:
  • 2009 Information Security Curriculum Development Conference
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

According to the latest Computer Security Institute (CSI) Annual Survey [7], computer infractions and attacks remain a pervasive problem in today's interconnected, globalized society. Financial losses reported or otherwise coupled with lost productivity are just some of the consequences that result from novel and sophisticated attacks. Until recently, the industry's approach was to develop more software-based solutions but Bellovin [5] states that our current software-dominated defenses against such attacks are woefully inadequate. The Trusted Computing Group (TCG) began its mission to promote the use of an open standards-based interoperability framework to embed hardware with software to improve computer security. Specifically, the TCG promotes the use of trusted hardware called the Trusted Platform Module (TPM) in conjunction with TPM-enhanced software to offer improved protection against attacks. Many of today's enterprise and consumer-grade laptops already are equipped with this hardware. This paper will detail some of the benefits of trusted computing, focusing on how the trusted platform works to enable roots of trust to offer improved security. The article will highlight and discuss some of the features and benefits of using this nascent technology in today's computing platform.