References:
Note:
15.1 The Security Problem
Figure 15.1 - Standard security attacks. Show
15.2 Program Threats
15.3 System and Network Threats
15.4 Cryptography as a Security Tool
15.5 User Authentication
15.6 Implementing Security Defenses
15.7 Firewalling to Protect Systems and Networks
Figure 15.10 - Domain separation via firewall.
15.8 Computer-Security Classifications ( Optional )
15.9 An Example: Windows XP ( Optional )
15.10 SummaryWhy is OS enforced file access controls not sufficient in the event of the loss or theft of a computer or mobile device group of answer choices?Why are OS-enforced file access controls not sufficient in the event of the loss or theft of a computer or mobile device? The disk (or other storage) could be attached to a foreign system and the administrator could take ownership of the files.
What is the purpose of TPM?TPM Overview. The TPM is a cryptographic module that enhances computer security and privacy. Protecting data through encryption and decryption, protecting authentication credentials, and proving which software is running on a system are basic functionalities associated with computer security.
What is trusted platform module TPM and how it works?A Trusted Platform Module (TPM) is a specialized chip on a laptop or desktop computer that is designed to secure hardware with integrated cryptographic keys. A TPM helps prove a user's identity and authenticates their device. A TPM also helps provide security against threats like firmware and ransomware attacks.
What would you use a TPM for quizlet?Trusted Platform Module (TPM) is a dedicated microprocessor used for securing computing hardware and providing cryptographic support. One of the most common uses for TPM is to provide full-disk encryption, usually with an external key or passcode used for decryption.
|