blog




  • Essay / Information Security: Strengths and Vulnerabilities...

    Progressive technological development has paved the way for the ever-increasing addition of multiple disparate devices. Devices that can connect to each other over a network, allowing them to communicate easily. Unfortunately, improving communication skills leads to a negative impact on information security. This harm is explained by the increased possibility of data loss and exploitation of vulnerabilities. In this article, we will seek to define one of these measures to ensure security; using the Trusted Platform Module (TPM). We will also explore the strengths and vulnerabilities of the Trusted Platform Module as well as attacks against the TPM in both hardware and software terms. Background: The term Trusted Platform Module refers to a design pattern and the execution of said design pattern established by the Trust Computing Group. The Trusted Computer Group is a global organizational body comprised of several computer technology providers for the creation of industry hardware standards. The Trusted Computing Group establishes requirements and recommendations for the production of hardware items that can be implemented to improve the defensive capabilities of IT assets. These standards define sets of rules for mobile devices, desktop systems, laptops and servers, as well as network infrastructure constraints. Stipulations regarding application programming interfaces as well as protocols required to operate in a trusted computing state are also described. (Malipatlolla et al, 2013) The Trusted Platform Module can be deployed as hardware or software component on a system containing RSA encryption keys detailed in...... middle of paper...... 16 - 16). Retrieved from https://www.usenix.org/events/sec04/tech/full_papers/sailer/sailer.pdf Malipatlolla, S. & Huss, S. & Shoufan, A. (2013). Sustainable Trusted Computing: A New Approach for Flexible and Secure Updating of Crypto Engines on a Trusted Platform Module. Mason, S. (2005). Trusted computing: trust your computer. Computer fraud and security, 20057-11. doi:10.1016/S1361-3723(05)00146-6McGill, K. (2013). Trusted mobile devices: Requirements for a trusted mobile platform module. Johns Hopkins AplTechnical Digest, 32(2), 544-554. Osborn, J. and Challener, D. (2013). Evolution of the trusted platform module. Johns Hopkins Apl Technical Digest, 32(2),536-543Winter, J. and Dietrich, K. (2012). A hijacker's guide to the Trusted Platform Module's communication interfaces. Computers and Mathematics with Applications, 65(5), 748-761.