YoVDO

Trustworthy Shield – A Cheap TPM Module for Older Systems

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses Hardware Security Courses IoT device management Courses

Course Description

Overview

Explore the concept of Trustworthy Shield, a cost-effective TPM module designed for older computer systems, in this 19-minute conference talk from the Hack In The Box Security Conference. Delve into the world of trusted computing as an active defense technology that can automatically protect against new security threats without relying on virus database updates. Learn how this innovative solution addresses the security challenges faced by older systems running legacy industry software on unsupported operating systems. Discover the features and components of Trustworthy Shield, including its chips, trusted computing platform, and policy management capabilities. Gain insights into the potential applications of this technology in IoT device management and trusted applications. Understand the history and technology behind trusted computing, and explore how this affordable solution can enhance security for older hardware without requiring significant modifications.

Syllabus

Introduction
Who am I
History of Trusted Computing
Technology of Trusted Computing
Trustworthy Shield
Chips
Features
Trusted Computing Platform
Trusted Server
Policy Management
IoT Devices Management
Trusted Application
Conclusion


Taught by

Hack In The Box Security Conference

Related Courses

Microsoft Azure IoT Developer: Manage IoT Devices with Azure IoT Central
Pluralsight
Exam Alert: Provision and Manage IoT Devices in Microsoft Azure
Pluralsight
Microsoft Azure IoT Developer: Manage IoT Devices with IoT Hub
Pluralsight
AWS IoT: Visual Walkthrough
Pluralsight
Manage IoT devices by using IoT Hub and apps
Microsoft via Microsoft Learn