Monday, August 12, 2019

Trusted computing and TPM-enhanced software Essay

Trusted computing and TPM-enhanced software - Essay Example Trusted Platform Module is not entirely competent in safeguarding computer systems from the associated threats in the modern world. Trusted Platform Module enhanced software entails securing the software part of a computer device, such as the generation of cryptographic keys. It ensures that the systems software is safe and convenient for use. Another software aspect is the random number generator, which eases the use of computer programs. The software of any computerized device is readily usable, easing the operation of the systems. TPM-enhanced software enables binding, which is the encryption of data using a bind key. It is from the storage key that the bind key arises. The TPM-enhanced software also allows sealing, which is the encryption of data, similar to binding. Operating on such a scale creates room for significant limitations and backlashes. The associated limitations result in major failures in the software of the computer system, which to my opinion is the cause of system failure. Numerous accusations exist, resulting in lack of trust in the system. Some of the associated failures include the accusation by Cambridge’s Ross Anderson that Trusted Computing is anticompetitive in its quest of locking users in the enforcement of DRM (Kim, 2009, p. 6). In my opinion, the invasion of privacy is among the failures of the system, for this reason limiting the success of Trusted Platform Module enhanced software as a system security platform for computer software. I believe that the scheme has not been able to safeguard computer software safely, without having to affect the user’s usage of the machine. Privacy invasion affects the user’s trust in the system since he or she has to remain watchful as they use their computerized systems. The TPM- enhanced software entails integrity measurement, reporting, and storage. The company, therefore, has access to the user’s whereabouts

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.