This website uses cookies to ensure you have the best experience. Learn more

Information Security: The Strength And Vulnerabilities Of The Trusted Platform Module

1318 words - 5 pages

Progressive technological development has paved the way for the ever increasing addition of multiple disparate devices. Devices which have the capability to connect to each other over a network affording them the ability to communicate with ease. Unfortunately the improved proficiency for communication carries with it a negative impact on information security. This detriment comes through the increased possibility of data loss and vulnerability exploitation. In this paper, we will seek to define one such measure to ensure security; by utilizing the Trusted Platform Module (TPM). We will also explore the strengths and vulnerabilities of the Trusted Platform Module as well as attacks against the TPM both in terms of hardware and software.

The term Trusted Platform Module pertains to a design model and the execution of said deign model established by the Trusted Compute Group. The Trusted Computer Group is a worldwide organizational body comprised of multiple computing technology vendors for the creation of industry hardware standards. The Trusted Computing Group establishes requirements and recommendations for the production of hardware elements which may be implemented to enhance the defensive capabilities of computing assets. These standards delineate rule sets for mobile devices, desktop systems, laptop computers, and servers as well as network infrastructure constraints. Stipulations concerning Application Programming Interfaces as well as the protocols required to function within a trusted computing state are additionally outlined. (Malipatlolla et al, 2013)
The Trusted Platform Module may be deployed in the form of hardware or as software component on a system that contains RSA encryption keys detailed to the host device for hardware verification. When the Trusted Platform Module is implemented as a hardware mechanism, it is a microchip detached from the central processor, but still connected to the motherboard. The Trusted Computing Group requirement states the Trusted Platform Module must provide for resistance from tampering. Every Trusted Platform Module chip contains a pair of RSA keys termed the Endorsement Key (EK). This RSA key pair is kept inside the chip and cannot be retrieved by software. The Storage Root Key is generated when users seize ownership of the system. This key pair is created by the Trusted Platform Module established by the Endorsement Key and an owner-defined password. Another key termed the Attestation Identity Key (AIK) guards the system against unapproved alterations to software or firmware. This is accomplished by hashing vital segments of firmware and software prior to being implemented. (Mason, 2005)

Logically, the TPM is organized into separate hardware and software elements. Each of one those elements have its own function. The Trusted Platform Module includes several operational mechanisms. The first is a cryptographic coprocessor which deals with digital signing, encryption, and...

Find Another Essay On Information Security: The Strength and Vulnerabilities of The Trusted Platform Module

The Strength and Weakness of The Press

1804 words - 8 pages to more and more people nationally and globally. They winded off from the traditional printed-paper phase and on to the new phase of information technology; they eventually get a place on the screen: computer screen, laptop screen, smartphone screen, tablet, and any other screens of devices that connect to their Internet-based news website. Overall, newspaper has been a great media to spread information. The current newspaper provides a platform

The Strength of Envy and Greed

1103 words - 5 pages life, destroyed his relationship with his community, and left him constantly frustrated and unsatisfied. It is the strength of envy and greed that controls our lives, corrupts our values, and has the ultimate ability of ending our lives.

The Strength of Family and Friends

1516 words - 6 pages , cared and amused by family and friends is one reason that my confidence and character has been built (Rubio 1). Jackie Karp, the writer of the poem “Family, The Center of My World”, writes about her loved ones, “You are the meaning of strength at its highest peak. You have courage when the rest of us are weak” (Karp 1). In the toughest situations, family and friends encourage others that need help getting back on their feet. In life, people learn

VoIP: A New Frontier for Security and Vulnerabilities

2668 words - 11 pages VoIP: A New Frontier for Security and Vulnerabilities Introduction to Voice over IP Technology      The promise of extremely cheap telephone service, utilizing the Internet to transmit voice, has made voice over IP an attractive and profitable idea. Vonage ( and other service providers entice consumers by charging a flat, monthly rate for unlimited long distance in the U.S. and Canada; the rate

The Strength and the Struggle

640 words - 3 pages prosperity found in “Builders” is evidenced here. The only signs of life are in the family itself, and perhaps the white swaddling blanket about the baby, symbolizing innocence, might also symbolize hope. Both paintings depict an African American family; however, each painting suggests a different feeling about family. “The Builders” portrays family as a unified force, positive and strong and headed toward progress, while “This is a Family Living in Harlem” depicts a family struggling to live. Nevertheless, both seem to suggest that family is a source of strength that surpasses the struggles against poverty or social strife.

The Strength of the Nation

1022 words - 4 pages "The righteous will flourish like a palm tree,they will grow like a cedar of Lebanon."(Psalm 92:12)It is mentioned seventy times in the Bible; King Solomon used its cedars to build his glorious temples, and the Romans built their only temple for Jupiter on its land. Moreover, it was from its coasts that the Phoenicians spread the world's first alphabet. The word 'Lebanon' symbolized beauty, strength, and pride. What was it that caused this fame

The Strength of Dilsey in The Sound and the Fury

794 words - 3 pages The Strength of Dilsey in The Sound and the Fury In The Sound and the Fury, the fated Compson family is a portrayal of both the declining old South and the new South that rose demonically out of its ruins. Through the Compsons, Faulkner personifies at once the mournful self-pity of a fallen gentry, and in Jason, the embittered rage and resentment of those who come after the fall. Throughout the novel, Dilsey is the one quiet

Protection of Information: One of the Internet Security topics

1656 words - 7 pages security level of information systems.In the current situation, data processing has moved the problems of information security forward to the rank of most important problems of national economy. Solving the problem of poor information security presupposes a complex of measures. First of all, such actions of government as development of classification system, documentation of information and protection methods, data access regulations and punishing

comparison between television, press, and the social media as the platform of political message

1330 words - 6 pages new platform like social media, is considered by the politician and people as an ideal modern public sphere. The promise of networking in cyberspace is that it opens huge space for voices which were never having access to powerful media. Moreover, the potential of this new technology relies on its super fast information delivery and ‘extremely targeted’ users (Gurak, 1999: 259). In other words, social media user can deliver information quickly to

Security and Consumer Protection in the Information Age

3706 words - 15 pages in a very long time. But thanks to the hard work, good will and a whole lot of people trying to make some money we have come up with ways to defend ourselves from those individuals attempting to use the Internet as a channel to prey on your personal information from afar. Within the research, analysis and implementation of a system of defense from these "criminerds" lays the very heart of information technology policy as it applies to security

The National Security Agency and its Access to Private Information

2417 words - 10 pages , the National Security Administration (NSA) has the ability to collect and analyze massive amounts of metadata from cellphone calls and automated texts. (Ball) Is this loss of privacy worth the benefits of an increasingly knowledgeable government? Unfortunately, there are far more negative consequences of any government tracking her people than positive ones. On June 5, 2013, Edward Snowden, a contractor of Booz Allen Hamilton working for the NSA

Similar Essays

The Environmental Platform Of The Republican, Democratic, And Green Parties

2314 words - 9 pages The Environmental Platform of the Republican, Democratic, and Green Parties The Environment has become a hot topic in political platforms as of late. With noticeable changes in weather patterns such as El Nino, La Nina, and the steady increase in the average daily temperatures, environmentalist group's views and values have become the views and values of more of the general public. This topic has even resulted in more support of the

The Purpose Of This Assignment Is To Analyse Source Code And Look For Vulnerabilities. The Vulnerabilities Identified Will Be Exploited With A

1475 words - 6 pages javascript to be embeded in the source code and the pop-up to show. The SQL injection allows the email field to be filled with a value of " ' OR 1=1 -- ". The original code failed because no value was entered for the email address. The registered username and password for this example is Tom. After registering with the XSS code in the email address field, the user logs in and the javascript pop-up with “Hacked ” appears. (See Figure 3.1-1 below

Twitter: The New Information Platform For Public Sphere

779 words - 4 pages ideas, real time information, quickly and easily, these elements becoming the audience’s basic requirement of information distributing and communication platform. Twitter embraces new technology, use sharing and circulating as it’s basic communication pattern, it encourages individual to get involved in to the news which means everyone can be the first time event publisher. In some way, twitter fits the needs of the audience today, and promoting the

The Role Of Information Security Policy

941 words - 4 pages Implementation of policies and standards within an organization are important to maintain information systems security. Employees within an organization play a huge role in the effort to create, execute, and enforce a security policy. Every business requires a different strategy and approach to it's security policy, depending on their size and nature of business. Security Policies An organization's security policy describes the company's