Lecture 08 - Trustworthy Computing Flashcards
Trusted Computing Base
Hardware, firmware, OS on which trust is placed.
FUD
Fear, Uncertainty, Doubt tactics to influence perception.
NGSCB
Next generation secure computing base by Microsoft.
TPM
Trusted Platform Module for hardware-based security.
Measured Boot
TPM verifies BIOS, firmware integrity during boot.
Secure Boot
Halts execution if boot measurements are incorrect.
PCR
Platform Configuration Registers for state storage.
Endorsement Key
Unique key set by manufacturer for TPM lifetime.
Memory Curtaining
security technique that isolates and protects specific areas of computer memory from unauthorized access.
Sealed Storage
Limited TPM storage encrypted by a storage key.
Remote Attestation
Verification of system’s integrity to remote entities.
Integrity Measurement Architecture
verifies and ensures the integrity of system components, enhancing security in the Linux kernel.
EVM
Extended Verification Module for offline tampering detection.
Digital Rights Management (DRM)
encompasses technologies that control access to and use digital content to enforce copyright protection.
Authenticated Boot
Measures boot state for remote verification.