SPEAKER: Mr. Usama Tharwat Elhagari
DATE: 3rd March 2011
Trusted Computing is the IT industry's answer to the growing challenges and potential costs of network and data security breaches. At its highest level, it aims to create secure computing environments for a range of industries without compromising functional integrity, privacy or individual rights. In order to establish specific practices and standards for developing and applying relevant technologies, these below elements are required:Self-Encrypting Drives (SEDs)
SEDs protect sensitive data on network endpoint devices, such as laptops, that operate outside the protection of the network firewall.Trusted Platform Modules (TPMs)
About 300,000,000 PCs have shipped with an embedded security token called a Trusted Platform Module (TPM). Today, virtually every business-class laptop comes equipped with these cryptographic chips, which deliver capabilities beyond traditional tokens or smart cards.· An object is trusted if and only if it operates as expected.
· An object is trustworthy if and only if it is proven to operate as expected
BY: Abdirahman Hussein Jibril (MC101170)