¶ … Trusted Platform Module is a dedicated microprocessor that is designed to secure computer hardware. TPM secures hardware by integrating cryptographic keys into the computer devices. According to Potter (2009)
the cryptographic keys are specific to the host system and they are used for authenticating the host systems hardware. Using hardware-based cryptography will ensure that all the information stored in the hardware is protected from any external software attacks. TPM security is vital to ensure that threats that occur at the hardware level are detected, and prevented from spreading to other computers. Hardware level threats target the BIOS system. When the computer BIOS has been attacked no software antivirus will have the capability to recognize the attack. TPM will authenticate the hardware in the system to provide platform integrity. Platform integrity will measure the integrity of the boot sector, disk MBR, BIOS, and operating system. The integrity measurement is intended to ensure that no unauthorized changes have taken place. If changes are detected, integrity test will fail, and the system will not fail to boot. TPM has the capability to recover and boot from the last known good configuration.
TPM is able to prevent malware attacks and rootkit attacks. Platform integrity will detect if there are any malware or rootkit attacks and this will prevent the computer form booting up. Preventing the system from booting will ensure that the user's data and information is secure. Platform integrity will ensure that before a computer is allowed network access it has to pass the integrity measurement. Authenticating users in a network is harder nowadays since attackers have discovered ways of cloning computers within a network. Using TPM the network administrator is able to identity, and confirm the identity of all the computers on the network before they authorize the computers to access the network. Ensuring that only healthy computers have access to the network will prevent the spread of viruses or malware. The number of black hat attacks...
TMP (Trusted Platform Module) is an international standard dedicated to secure hardware by integrating the security cryptographic keys into hardware devices. In other words, the TMP is a secure cryptoprocessor integrated into the computer motherboards enabling full disk encryption without using extremely long paraphrases. When a user buys a personal computer, the TPM is built into the computer's motherboard with the goal to offer security into the computer systems
Cybersecurity Vulnerability What are Vulnerabilities? Hardware attacks because of Vulnerabilities Hardware Data modification / injection The Scientist Argument Secure Coprocessing How organizations can best address its potential impacts Cybersecurity Vulnerability: Hardware Weakness This essay introduces the role that computer hardware weakness opens the door up for attack in cyber-physical systems. Hardware security -- whether for attack or defense -- is not the same as software, network, and data security on account of the nature of hardware. Regularly, hardware
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now