O'Reilly logo

A Practical Guide to Trusted Computing by Leendert Van Doorn, David Safford, Ryan Catherman, Kent Yoder, David Challener

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 12

Trusted Computing and Secure Storage

In a world of government regulations, such as Sarbanes-Oxley, the Health Insurance Portability and Accountability Act (HIPAA), and overall sensitivity to privacy, it is important that people be able to secure data. However, when a hard disk is available to an attacker (such as when a laptop is stolen), software cannot easily hide the keys necessary to provide security. This is particularly the case since the things a person needs to authenticate to a machine have to be remembered easily. The software is unable to defend itself against a dictionary attack, and although a removable device may be a good solution to this problem, in practice these devices get lost or broken. Often this happens when ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required