Tuesday, 5 April 2011

Talk by Mr. Usama Tharwat Elhagari (2nd & 3rd March 2011)

These two days were being lectured by Mr. Usama Tharwat Elhagari from CyberSecurity. He is an Egyptian and he is doing his research in Trusted Computing. The seminar held at Lecture Room 2, N28.


LET'S CHECK IT OUT WHAT IT IS... ^__^


Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning. With Trusted Computing, the computer will consistently behave in expected ways, and those behaviors will be enforced by hardware and software. In practice, Trusted Computing uses cryptography to help enforce a selected behavior. The main functionality of TC is to allow someone else to verify that only authorized code runs on a system. This authorization covers initial booting and kernel and may also cover applications and various scripts. Just by itself TC does not protect against attacks that exploit security vulnerabilities introduced by programming bugs.


Can you trust your computer? --> By Richard Stallman

  • What should your computer take its orders form?
    • Treacherous computing
      • The plan is designed to make sure your computer will systematically disobey you
      • In fact, it is designed to stop your computer from functioning as a general-purpose computer. every operation may require explicit permission.

Key Concept
Trusted Computing encompasses six key technology concepts, of which all are required for a fully Trusted system, that is, a system compliant to the TCG specifications:
  1. Endorsement key
  2. Secure input and output
  3. Memory curtaining / protected execution
  4. Sealed storage
  5. Remote attestation
  6. Trusted Third Party (TTP)

Hard Drive Encryption

The Microsoft products Windows Vista and Windows 7 make use of a Trusted Platform Module to facilitate BitLocker Drive Encryption.

No comments:

Post a Comment