Helaas is de inhoud van deze pagina niet beschikbaar in de taal van uw keuze.

Ga naar hoofdinhoud


Home Trusted computing

Trusted computing

(also TC)

Trusted computing definition

Trusted computing is a computing structure created to boost the security of computers or networks by forming a foundation of trust. Trusted computing guarantees that hardware, software, and firmware elements function as designed, delivering a safer environment for users by thwarting unauthorized access, manipulation, and security incidents.

See also: end-to-end encryption

Trusted computing examples

  • Trusted Platform Module (TPM): A dedicated microcontroller that securely stores encryption keys, passwords, and digital certificates. TPMs can be found in many modern computers, ensuring data protection and platform integrity.
  • Hardware Security Module (HSM): A physical device that safeguards and manages digital keys, performs encryption and decryption, and provides strong authentication for critical applications and services.
  • Intel Software Guard Extensions (SGX): A set of security-related instruction codes that enable applications to create a protected area of memory called an enclave, which is inaccessible to other processes running on the same system.

Trusted computing vs. secure computing

Trusted computing focuses on providing a root of trust and ensuring the integrity of hardware, software, and firmware components. Secure computing encompasses a broader range of security measures, including encryption, access control, and vulnerability management, aimed at protecting sensitive data and ensuring confidentiality, integrity, and availability.

Pros and cons of trusted computing

Pro:

  • Enhanced security, prevention of unauthorized access and tampering, protection of sensitive data.

Con:

  • Potential privacy issues, increased complexity, and possible vendor lock-in.

Trusted computing tips

  • Use hardware components with built-in trusted computing features.
  • Keep your software and firmware up-to-date.
  • Implement strong access controls and authentication mechanisms.
  • Consider using a VPN like NordVPN to encrypt your internet connection and protect your data from eavesdropping.