StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Trusted computing and TPM-enhanced software - Essay Example

Cite this document
Summary
The Trusted Computing Group, with the intention of providing safety for organizational data, started the company. The company is for this reason in…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.7% of users find it useful
Trusted computing and TPM-enhanced software
Read Text Preview

Extract of sample "Trusted computing and TPM-enhanced software"

TRUSTED PLATFORM MODULE ENHANCED SOFTWARE al Affiliation TPM-enhanced software plays an important role in safeguarding sensitive information and data of major companies and institutions. The Trusted Computing Group, with the intention of providing safety for organizational data, started the company. The company is for this reason in possession of ample data that must be safeguarded from any form of leakage or damage. In my opinion, the organization has played a significant role in ensuring the security of data and information belonging to major companies (Kim, 2009, p. 5). However, there exist numerous flaws and limitations associated with the organization, making it less efficient.

Trusted Platform Module is not entirely competent in safeguarding computer systems from the associated threats in the modern world. Trusted Platform Module enhanced software entails securing the software part of a computer device, such as the generation of cryptographic keys. It ensures that the systems software is safe and convenient for use. Another software aspect is the random number generator, which eases the use of computer programs. The software of any computerized device is readily usable, easing the operation of the systems.

TPM-enhanced software enables binding, which is the encryption of data using a bind key. It is from the storage key that the bind key arises. The TPM-enhanced software also allows sealing, which is the encryption of data, similar to binding. Operating on such a scale creates room for significant limitations and backlashes. The associated limitations result in major failures in the software of the computer system, which to my opinion is the cause of system failure. Numerous accusations exist, resulting in lack of trust in the system.

Some of the associated failures include the accusation by Cambridge’s Ross Anderson that Trusted Computing is anticompetitive in its quest of locking users in the enforcement of DRM (Kim, 2009, p. 6). In my opinion, the invasion of privacy is among the failures of the system, for this reason limiting the success of Trusted Platform Module enhanced software as a system security platform for computer software. I believe that the scheme has not been able to safeguard computer software safely, without having to affect the user’s usage of the machine.

Privacy invasion affects the user’s trust in the system since he or she has to remain watchful as they use their computerized systems. The TPM- enhanced software entails integrity measurement, reporting, and storage. The company, therefore, has access to the user’s whereabouts and intentions. Third parties can also access the users’ private information in the case of leakage. The system does not provide a guarantee over such cases of leakage, for this reason limiting the efficiency of the TPM-enhanced software.

The system is also in control of the user’s browsing habits and most proffered websites. As depicted in the paper, Trusted Computing has significant limitations despite its significance. The system has played a critical role as an important computer software systems. However, the accessibility of a user’s personal information is hazardous in case of leakage. The system does not account for such losses and leakages. For the betterment of the system, there must be an account of prevention measures in case of information leakage.

Trusted Platform Module enhanced software must also ensure that it does not invade the user’s private information. It will help in maximizing the trust of its users to the system. Without such elaborate measures, the organization may lack to satisfy the demand of the clients fully. Despite these significant limitations, Trusted Platform Module enhanced software has played a significant role in ensuring the safety of computer software systems for all of its users. Reference ListKim, R., 2009.

Trusted Platform Module and Privacy: Promises and Limitations. Auckland: University of Auckland..

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Trusted computing and TPM-enhanced software Essay”, n.d.)
Trusted computing and TPM-enhanced software Essay. Retrieved from https://studentshare.org/information-technology/1676210-trusted-computing-and-tpm-enhanced-software
(Trusted Computing and TPM-Enhanced Software Essay)
Trusted Computing and TPM-Enhanced Software Essay. https://studentshare.org/information-technology/1676210-trusted-computing-and-tpm-enhanced-software.
“Trusted Computing and TPM-Enhanced Software Essay”, n.d. https://studentshare.org/information-technology/1676210-trusted-computing-and-tpm-enhanced-software.
  • Cited: 0 times

CHECK THESE SAMPLES OF Trusted computing and TPM-enhanced software

Managing at the Edge

1.... In Freedom, Inc.... the authors described “How” companies and “Why” companies.... How does the operation of “why” companies differ from “how” companies?... 'How' companies are the type of companies which work through instructing their employees what to do, how to do it, how to behave at work place, and how to be a good employee (as cited in Carney and Getz, 2009, p....
8 Pages (2000 words) Research Paper

The Lean Manufacturing Concept

It includes the healthcare services, call centre services, higher education, public and professional services and also in the software development services.... Management Introduction The current manufacturing and service industry has encountered many changes from that of the traditional manufacturing and service system which was prevalent in the past....
13 Pages (3250 words) Essay

Developing People and Planning Work

In current business environment, people are prized assets, and they end up working together to form groups and teams that are an inevitable part of the organizations.... While teams are prevalent, motivating teams has not yet been very successful.... Team dynamics are different than individual dynamics....
10 Pages (2500 words) Assignment

Knowledge managementl

The global technology is altering rapidly and the manner in which the corporates, the world over, operate is changing rapidly driven by this transforming technology and a keen desire to compete and acquire a bigger share of market.... he business objectives have turned from mere… To achieve this companies are constantly working towards improving production levels and quality by speeding processes involved in production and as well as consciously In this milieu an increasing number of companies are getting to recognize the fact that they cannot excel in everything connected to their business and delivery of products and services they are known in the market for and construction industry is one such industry where dependence relationships develop in networks with specialization clearly demarcating inputs into any project....
12 Pages (3000 words) Essay

Marks and Spencer's and Nestle Strategic Development

The paper 'Marks and Spencer's and Nestle Strategic Development' presents strategy development processes of these two companies.... The paper has also compared how the two companies exercise motivational aspects, their organizational cultures, and their organizational structures.... hellip; Safe working conditions are provided by Marks and Spencer's that meet all legal law requirements....
9 Pages (2250 words) Term Paper

Solid modeling

Later, UNISURF developed into the working foundation for the subsequent generation of computer-aided design software.... 3210) Solid modeling is different from related fields of computer graphics and geometric modeling since it stresses physical fidelity.... hellip; These principles support the formation, animation, exchange, interrogation, visualization, annotation, and examination of digital prototypes of physical matters (Escobar et al....
9 Pages (2250 words) Research Paper

Placement Portfolio in Health Information Management

The reporter casts light upon the fact that professional placement of students in Health Information Management is believed to be quite imperative for ensuring that the students obtain knowledge about the activities performed for improving the lives of the related community.... hellip; East Grampians Health Service (EGHS) (2008) is a rural hospital providing healthcare services for enhancing the health as well as the lifestyle of the community....
8 Pages (2000 words) Assignment

Business Processes and New Technologies in Business Organizations

… The paper "Business Information Systems" is a brilliant example of a term paper on business.... Business process modeling (BPM) is performed by business analysts as an activity to represent processes of a firm so that the existing process may be improved or analyzed.... The subject matter experts provide specialized knowledge of the processes while analysts provide expertise in the modeling discipline....
7 Pages (1750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us