Trustworthy Shield – A Cheap TPM Module for Older Systems
Offered By: Hack In The Box Security Conference via YouTube
Course Description
Overview
Explore the concept of Trustworthy Shield, a cost-effective TPM module designed for older computer systems, in this 19-minute conference talk from the Hack In The Box Security Conference. Delve into the world of trusted computing as an active defense technology that can automatically protect against new security threats without relying on virus database updates. Learn how this innovative solution addresses the security challenges faced by older systems running legacy industry software on unsupported operating systems. Discover the features and components of Trustworthy Shield, including its chips, trusted computing platform, and policy management capabilities. Gain insights into the potential applications of this technology in IoT device management and trusted applications. Understand the history and technology behind trusted computing, and explore how this affordable solution can enhance security for older hardware without requiring significant modifications.
Syllabus
Introduction
Who am I
History of Trusted Computing
Technology of Trusted Computing
Trustworthy Shield
Chips
Features
Trusted Computing Platform
Trusted Server
Policy Management
IoT Devices Management
Trusted Application
Conclusion
Taught by
Hack In The Box Security Conference
Related Courses
Hardware SecurityUniversity of Maryland, College Park via Coursera Information Security- II
Indian Institute of Technology Madras via Swayam Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam Cybersecurity
University of Maryland, College Park via Coursera Learning Mobile Device Security
LinkedIn Learning