Progressive technological development has paved the way for the ever-increasing addition of multiple disparate devices. Devices that have the ability to connect to each other over a network giving them the ability to communicate with ease. Unfortunately, improving communication skills brings with it a negative impact on information security. This disadvantage comes from the increased possibility of data loss and vulnerability exploitation. In this document we will try to define one of these measures to ensure security; using the Trusted Platform Module (TPM). We will also explore the strengths and vulnerabilities of the Trusted Platform Module as well as attacks against the TPM in both hardware and software terms. Context: The term Trusted Platform Module refers to a design pattern and the execution of that pattern design established by the Trusted Processing Group. The Trusted Computer Group is a global organizing body composed of several computer technology vendors for creating industry hardware standards. The Trusted Computing Group establishes requirements and recommendations for the production of hardware elements that can be implemented to improve the defensive capabilities of computing resources. These standards outline rule sets for mobile devices, desktop systems, laptops, and servers, as well as network infrastructure constraints. Provisions for application programming interfaces and protocols needed to operate within a reliable computing state are also outlined. (Malipatlolla et al, 2013) The Trusted Platform Module can be deployed in the form of hardware or as a software component on a system that contains RSA encryption keys detailed in… middle of the paper… 16- 16). Retrieved from https://www.usenix.org/events/sec04/tech/full_papers/sailer/sailer.pdf Malipatlolla, S. & Huss, S. & Shoufan, A. (2013). Sustainable Trust Computing: A Novel Approach for Flexible and Secure Updating of Cryptographic Engines on a Trusted Platform Module. Mason, S. (2005). Trusted Computing: Trusting your computer to be trustworthy. Computer fraud and security, 20057-11. doi:10.1016/S1361-3723(05)00146-6McGill, K. (2013). Trusted mobile devices: Requirements for a trusted mobile platform module. Johns Hopkins AplTechnical Digest, 32(2), 544-554. Osborn, J., & Challener, D. (2013). Evolution of the reliable platform module. Johns Hopkins Apl Technical Digest, 32(2),536-543Winter, J., & Dietrich, K. (2012). A Hijacker's Guide to Trusted Platform Module Communication Interfaces. Computers and mathematics with applications, 65(5), 748-761.
tags