21
1 NEW GENERATION SECURE COMPUTING BASE

1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION Next Generation Secure Computing Base,formerly known as Palladium. The aim for palladium is

Embed Size (px)

Citation preview

Page 1: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION  Next Generation Secure Computing Base,formerly known as Palladium.  The aim for palladium is

1

NEW GENERATION SECURE COMPUTING BASE

Page 2: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION  Next Generation Secure Computing Base,formerly known as Palladium.  The aim for palladium is

2

INTRODUCTION

Next Generation Secure Computing Base,formerly known as Palladium.

The aim for palladium is to increase the security and privacy of computer user.

Palladium refers to as a security chip

Page 3: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION  Next Generation Secure Computing Base,formerly known as Palladium.  The aim for palladium is

3

INTRODUCTION (CONT………..)

Internet security is also provided by palladium such as protecting data from virus and hacking of data.

Palladium gives individual & groups of users greater data security ,personal privacy & system integrity.

Page 4: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION  Next Generation Secure Computing Base,formerly known as Palladium.  The aim for palladium is

4

Solution :Palladium

Page 5: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION  Next Generation Secure Computing Base,formerly known as Palladium.  The aim for palladium is

5

The fundamental benefit of Palladium fall into three chief categories;Greater system integrity, superior personal privacy & enhanced data security System integrity: Verification of hardware/software component, to what they are and what sealed data they can access.

Page 6: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION  Next Generation Secure Computing Base,formerly known as Palladium.  The aim for palladium is

6

Enhanced data security:

Authenticate machine identify

keys are stored sealed storage

Protect personal privacy:

Prevent unauthorized access of personal data from the network

Page 7: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION  Next Generation Secure Computing Base,formerly known as Palladium.  The aim for palladium is

7

CORE PRINCIPLES OF PALLADIUM

Palladium comprises two key component :

Hardware Software

Page 8: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION  Next Generation Secure Computing Base,formerly known as Palladium.  The aim for palladium is

8

HARDWARE COMPONENTS

TRUSTED SPACE

SEALED STORAGE

ATTESTATION

Page 9: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION  Next Generation Secure Computing Base,formerly known as Palladium.  The aim for palladium is

9

TRUSTED SPACE

The execution space is protected from external software attacks such as a virus.

Trusted space is set up and maintained by nexus .

Page 10: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION  Next Generation Secure Computing Base,formerly known as Palladium.  The aim for palladium is

10

SEALED STORAGE

Sealed storage is an authenticated mechanism allows a program to store secrets that cannot be retrieved by no trusted program such as a virus or Trojan horse.

Page 11: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION  Next Generation Secure Computing Base,formerly known as Palladium.  The aim for palladium is

11

ATTESTATION

Attestation is a mechanism that allows the user to reveal selected characteristics of the operating environment to external requestor

Page 12: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION  Next Generation Secure Computing Base,formerly known as Palladium.  The aim for palladium is

12

SOFTWARE COMPONENTS

NEXUS

TRUSTED AGENT

Page 13: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION  Next Generation Secure Computing Base,formerly known as Palladium.  The aim for palladium is

13

NEXUS

Technology formerly referred to as the Trusted Operating Root(TOR).

The nexus executes in kernel mode in the trusted space.

It provides basic services to trusted agents

Page 14: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION  Next Generation Secure Computing Base,formerly known as Palladium.  The aim for palladium is

14

TRUSTED AGENT

Trusted agent is a program a part of a program ,or a service that runs in user mode in the trusted spaceA Trusted agent calls the nexus for security related services and critical general services such as memory management

Page 15: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION  Next Generation Secure Computing Base,formerly known as Palladium.  The aim for palladium is

15

Know Element of PalladiumThe system will store personal data with in an encrypted folder.

The system will filter

The system has personal information sharing agent called”My Man”.

The system will depend on hardware that has either a digital signature or tracking number.

The system purports to stop viruses by preventing the running of malicious programs

Page 16: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION  Next Generation Secure Computing Base,formerly known as Palladium.  The aim for palladium is

16

COMPARISON OF TCPA and PALLADIUM

TCPA Stands for Trusted Computing Platform Alliance, an initiative led by Intel.

Palladium is a software that Microsoft says it plane to incorporate in future version of Window.

Page 17: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION  Next Generation Secure Computing Base,formerly known as Palladium.  The aim for palladium is

17

ADVANTAGES OF PALLADIUM

BLOCK MALICIOUS CODE

DIGITAL RIGHT MANAGEMENT

Page 18: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION  Next Generation Secure Computing Base,formerly known as Palladium.  The aim for palladium is

18

DISADVANTAGES OF PALLADIUM

UPGRADES

INTEROPERABILITY

LEGACY PROGRAMS

Page 19: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION  Next Generation Secure Computing Base,formerly known as Palladium.  The aim for palladium is

19

CONCLUSION This technology will provide tougher security

defenses and more abudnat privacy. Palladium users will have unparallel power over

system integrity ,Personal privacy and data security.

A new generation of Palladium compatible hardware and peripherals will need to design and built.

Palladium is not a magic bullet. It provided the trustworthiness necessary to

enable business ,government and individual to fully embrace the increasing digitization of life.

Page 20: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION  Next Generation Secure Computing Base,formerly known as Palladium.  The aim for palladium is

20

FUTURE ENHANCEMENT

Palladium could easily becomes a requirement for future Window Microsoft has been some cool enhancement in 2010 version

Page 21: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION  Next Generation Secure Computing Base,formerly known as Palladium.  The aim for palladium is

21