Chapter 12

Trusted Computing and Secure Storage

In a world of government regulations, such as Sarbanes-Oxley, the Health Insurance Portability and Accountability Act (HIPAA), and overall sensitivity to privacy, it is important that people be able to secure data. However, when a hard disk is available to an attacker (such as when a laptop is stolen), software cannot easily hide the keys necessary to provide security. This is particularly the case since the things a person needs to authenticate to a machine have to be remembered easily. The software is unable to defend itself against a dictionary attack, and although a removable device may be a good solution to this problem, in practice these devices get lost or broken. Often this happens when ...

Get A Practical Guide to Trusted Computing now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.