Chapter 12

Trusted Computing and Secure Storage

In a world of government regulations, such as Sarbanes-Oxley, the Health Insurance Portability and Accountability Act (HIPAA), and overall sensitivity to privacy, it is important that people be able to secure data. However, when a hard disk is available to an attacker (such as when a laptop is stolen), software cannot easily hide the keys necessary to provide security. This is particularly the case since the things a person needs to authenticate to a machine have to be remembered easily. The software is unable to defend itself against a dictionary attack, and although a removable device may be a good solution to this problem, in practice these devices get lost or broken. Often this happens when ...

Get A Practical Guide to Trusted Computing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.