Skip to Main Content
Information Security: Contemporary Cases
book

Information Security: Contemporary Cases

by Marie A. Wright, John S. Kakalik
August 2010
Intermediate to advanced content levelIntermediate to advanced
214 pages
9h 49m
English
Jones & Bartlett Learning
Content preview from Information Security: Contemporary Cases
3. Why are open standards important in security?
4. Why would IBM be an advocate for open standards? Why would it
change its proprietary ESS 1.0 chip—which it had already sold in
some of its PL300 desktops and T23 ThinkPad notebooks, and
which it had paid a Common Criteria Testing Laboratory to eval-
uate—so that it was available as open source?
5. What does trusted computing mean?
6. What is the trusted platform module?
7. Describe the major differences between ESS 1.0 and ESS 2.0.
8. How can the trusted boot functions prevent the unauthorized mod-
ification of the operating system?
9. What is the purpose of the endorsement key? The storage root key? ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Executive Guide to Information Security, The: Threats, Challenges, and Solutions

Executive Guide to Information Security, The: Threats, Challenges, and Solutions

Mark Egan
Breaking into Information Security

Breaking into Information Security

Josh More, Anthony J. Stieber, Chris Liu

Publisher Resources

ISBN: 9780763738198