'Trusted computing’ (TC) is the concept that technologies have built-in processes to revolve basic security problems and user challenges.
It is also a term used by a trade group called the Trusted Computing Group (TCG) that helps to set standards for devices and technologies.
Some elements of trusted computing have to do with making devices in ways that are consistent, so that the security community can apply guidelines, standards and strategies universally.
For example, one element of trusted computing involved design for secure input/output. Here, engineers and others look at different types of malware such as spyware and key loggers to understand how systems can be defended from these kinds of attacks.
The use of new encryption keys, hash encryption strategies and other state-of-the-art security standards are also good examples of a trusted computing approach. Over time, the community of database engineers has created hashing systems that effectively block hackers from capturing many kinds of data through unauthorized database use.
The use of more modern security standards, universally applied to hardware and technology products, is supposed to be able to create a safer overall an environment for users. The nonprofit Trusted Computing Group benefits from the involvement of major manufacturers and other parties involved in offering business and consumer facing products to the world. Much more information on this term and what it can entail can be found on the TCG website which features a running tally of 'total secured endpoints’ where officials claim to have put in place superior security architecture.
It is also a term used by a trade group called the Trusted Computing Group (TCG) that helps to set standards for devices and technologies.
Some elements of trusted computing have to do with making devices in ways that are consistent, so that the security community can apply guidelines, standards and strategies universally.
For example, one element of trusted computing involved design for secure input/output. Here, engineers and others look at different types of malware such as spyware and key loggers to understand how systems can be defended from these kinds of attacks.
The use of new encryption keys, hash encryption strategies and other state-of-the-art security standards are also good examples of a trusted computing approach. Over time, the community of database engineers has created hashing systems that effectively block hackers from capturing many kinds of data through unauthorized database use.
The use of more modern security standards, universally applied to hardware and technology products, is supposed to be able to create a safer overall an environment for users. The nonprofit Trusted Computing Group benefits from the involvement of major manufacturers and other parties involved in offering business and consumer facing products to the world. Much more information on this term and what it can entail can be found on the TCG website which features a running tally of 'total secured endpoints’ where officials claim to have put in place superior security architecture.
0 Comments