Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Trustworthy Shield – A Cheap TPM Module for Older Systems

Hack In The Box Security Conference via YouTube

Overview

Explore the concept of Trustworthy Shield, a cost-effective TPM module designed for older computer systems, in this 19-minute conference talk from the Hack In The Box Security Conference. Delve into the world of trusted computing as an active defense technology that can automatically protect against new security threats without relying on virus database updates. Learn how this innovative solution addresses the security challenges faced by older systems running legacy industry software on unsupported operating systems. Discover the features and components of Trustworthy Shield, including its chips, trusted computing platform, and policy management capabilities. Gain insights into the potential applications of this technology in IoT device management and trusted applications. Understand the history and technology behind trusted computing, and explore how this affordable solution can enhance security for older hardware without requiring significant modifications.

Syllabus

Introduction
Who am I
History of Trusted Computing
Technology of Trusted Computing
Trustworthy Shield
Chips
Features
Trusted Computing Platform
Trusted Server
Policy Management
IoT Devices Management
Trusted Application
Conclusion

Taught by

Hack In The Box Security Conference

Reviews

Start your review of Trustworthy Shield – A Cheap TPM Module for Older Systems

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.