Trusted Computing Course
Course
Online
*Indicative price
Original amount in EUR:
280 €
Description
-
Type
Course
-
Methodology
Online
-
Start date
Different dates available
The English expression Trusted Computing refers to a nascent technology, derived from specifications of the Trusted Computing Group (TCG), inherited, in turn, from those of the Trusted Computing Platform Alliance (TCPA). The main objective of this technology is to make devices, such as computers or mobile phones leaving the factory, guaranteed against any tampering such as the presence of extraneous codes or other, through the use of appropriate hardware and software. This purpose is achieved by inserting a chip, called Trusted Platform Module, in each device, equipped with a pair of unique cryptographic keys for each chip, impossible to modify even by the owner, and capable of generating other keys for data encryption or devices. At the basis of Trusted Computing there are asymmetric encryption mechanisms applied for the following purposes: each single device is uniquely identified by a sort of electronic passport, the information can be encrypted and signed with the machine key and, finally, the encryption of the information is performed at the hardware level in secure mode. The TPM unit, according to the specifications of the Trusted Computing Group, will have five main functionalities. Each has a different purpose, although they can be used together. However, for them to be active, the software in use must also implement support. These features are: Endorsement Key, Secure I / O, Memory curtaining,
Facilities
Location
Start date
Start date
Reviews
Subjects
- Computing
Course programme
Trusted Computing Course
*Indicative price
Original amount in EUR:
280 €
