Copyright © 1995-2006 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.

Slides:



Advertisements
Similar presentations
Wei Lu 1, Kate Keahey 2, Tim Freeman 2, Frank Siebenlist 2 1 Indiana University, 2 Argonne National Lab
Advertisements

Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Operating System Security
Peer-to-Peer vs. Client/Server Network Operating Systems Instructor: Dr. Najla Al-Nabhan
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture notes.
 Researchers subverted a botnet’s command and control infrastructure (proxy bots) o Modified its spam messages to point to the Web server under researcher.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing -Lecture Twelve.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 5 03/08/2010 Security and Privacy in Cloud Computing.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Ten –
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Security in By: Abdulelah Algosaibi Supervised by: Prof. Michael Rothstein Summer II 2010: CS 6/79995 Operating System Security.
Copyright © B. C. Neuman, - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Fall Security Systems Lecture notes Drs.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Three.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture notes.
Copyright © B. C. Neuman, - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Fall Security Systems Lecture notes Dr.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing - Lecture Fifteen.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Six –
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Seven.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing - Lecture Fourteen.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
Securing Information Transfer in Distributed Computing Environments AbdulRahman A. Namankani.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Nine –
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Operating Systems.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
 When Bill Gates saw how successful the apple “Lisa” computer and “Mac” computer were doing he decided to create an operating system with a GUI himself.
Trusted Computing BY: Sam Ranjbari Billy J. Garcia.
Week #7 Objectives: Secure Windows 7 Desktop
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Storage & Revoking.
CS CS 5150 Software Engineering Lecture 18 Security.
An approach to on the fly activation and deactivation of virtualization-based security systems Denis Efremov Pavel Iakovenko
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Copyright © Clifford Neuman and Dongho Kim - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Advanced Operating Systems Lecture.
Lecture 13 Page 1 Advanced Network Security Authentication and Authorization in Local Networks Advanced Network Security Peter Reiher August, 2014.
Privilege separation in Condor Bruce Beckles University of Cambridge Computing Service.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
Operating Systems Security
Copyright © Clifford Neuman and Dongho Kim - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Advanced Operating Systems Lecture.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Security Vulnerabilities in A Virtual Environment
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Creating and Managing Digital Certificates Chapter Eleven.
Understand Encryption LESSON 2.5_A Security Fundamentals.
Archictecture for MultiLevel Database Systems Jeevandeep Samanta.
1 BCS 4 th Semester. Step 1: Download SQL Server 2005 Express Edition Version Feature SQL Server 2005 Express Edition SP1 SQL Server 2005 Express Edition.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
INF526: Secure Systems Administration Composition of Systems And Security Domains Prof. Clifford Neuman Lecture 3 3 June 2016 OHE100C.
© 2015 Digital Rights Management in a 3G Mobile Phone and Beyond Thomas S.Messerges, Ezzat A. Dabbish ILKOO LEE.
Outline What does the OS protect? Authentication for operating systems
Outline What does the OS protect? Authentication for operating systems
Hardware Security – Highlevel Survey Review for Exam 4
The bios.
Test 3 review FTP & Cybersecurity
Presentation transcript:

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture notes Fall 2006 Dr. Clifford Neuman University of Southern California Information Sciences Institute

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Announcements New course in Spring - Trusted Computing – –Friday’s at 1PM –Available now for registration Final lecture in two weeks –I need a volunteer to administer evaluations (send me an following class) –Topics to be chosen by class ▪Send me topics you would like to hear ▪I will write the lecture to cover those topics. Final exam –Monday December 11 th at 11:00 AM

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Security Fellowship Availability Short deadline (today) – probably too late, but you can always consider preparing to submit to next years program. – working/graduatefellowshippgms.jsp

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Security Systems Lecture 13 – November 17, 2006 Trusted Computing Dr. Clifford Neuman University of Southern California Information Sciences Institute

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Trusted vs. Trustworthy We trust our computers –We depend upon them. –We are vulnerable to breaches of security. Our computer systems today are not worthy of trust. –We have buggy software –We configure the systems incorrectly –Our user interfaces are ambiguous regarding the parts of the system with which we communicate. FROM PREVIOUS LECTURE

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE A Controversial Issue Many individuals distrust trusted computing. One view can be found at –An animated short film by Benjamin Stephan and Lutz Vogel FROM PREVIOUS LECTURE

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Separation of Security Domains Need to delineation between domains –Old Concept: ▪Rings in Multics ▪System vs. Privileged mode –But who decides what is trusted ▪User in some cases ▪Third parties in others ▪Trusted computing provides the basis for making the assessment. FROM PREVIOUS LECTURE

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Trusted Path We need a “trusted path” –For user to communicate with a domain that is trustworthy. ▪Usually initiated by escape sequence that application can not intercept: e.g. CTL-ALT-DEL –Could be direct interface to trusted device: –Display and keypad on smartcard FROM PREVIOUS LECTURE

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Communicated Assurance We need a “trusted path” across the network. Provides authentication of the software components with which one communicates. FROM PREVIOUS LECTURE

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Trusted Baggage So why all the concerns in the open source community regarding trusted computing. –Does it really discriminate against open sources software. –Can it be used to spy on users. FROM PREVIOUS LECTURE

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Equal Opportunity for Discrimination Trusted computing means that the entities that interact with one another can be more certain about their counterparts. This gives all entities the ability to discriminate based on trust. Trust is not global – instead one is trusted “to act a certain way”. FROM PREVIOUS LECTURE

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Equal Opportunity for Discrimination(2) Parties can impose limits on what the software they trust will do. That can leave less trusted entities at a disadvantage. Open source has fewer opportunities to become “trusted”. FROM PREVIOUS LECTURE

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Is Trusted Computing Evil Trusted computing is not evil –It is the policies that companies use trusted computing to enforce that are in question. –Do some policies violate intrinsic rights or fair competition? –That is for the courts to decide. FROM PREVIOUS LECTURE

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE What can we do with TC? Clearer delineation of security domains –We can run untrusted programs safely. ▪Run in domain with no access to sensitive resources –Such as most of your filesystem –Requests to resources require mediation by TCB, with possible queries user through trusted path. FROM PREVIOUS LECTURE

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Mediating Programs Today Why are we so vulnerable to malicious code today? –Running programs have full access to system files. –Why? NTFS and XP provide separation. ▪But many applications won’t install, or even run, unless users have administrator access. –So we run in “System High” FROM PREVIOUS LECTURE

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Corporate IT Departments Solve this Users don’t have administrator access even on their own laptops. –This keeps end users from installing their own software, and keeps IT staff in control. –IT staff select only software for end users that will run without administrator privileges. –But systems still vulnerable to exploits in programs that cause access to private data. –Effects of “Plugins” can persist across sessions. FROM PREVIOUS LECTURE

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE The next step But, what if programs were accompanied by third party certificates that said what they should be able access. –IT department can issues the certificates for new applications. –Access beyond what is expected results in system dialogue with user over the trusted path. FROM PREVIOUS LECTURE

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Red / Green Networks (1) Butler Lampson of Microsoft and MIT suggests we need two computers (or two domains within our computers). –Red network provides for open interaction with anyone, and low confidence in who we talk with. –We are prepared to reload from scratch and lose our state in the red system. FROM PREVIOUS LECTURE

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Red / Green Networks (2) The Green system is the one where we store our important information, and from which we communicate to our banks, and perform other sensitive functions. –The Green network provides high accountability, no anonymity, and we are safe because of the accountability. –But this green system requires professional administration. –My concern is that a breach anywhere destroys the accountability for all. FROM PREVIOUS LECTURE

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Somewhere over the Rainbow But what if we could define these systems on an application by application basis. –There must be a barrier to creating new virtual systems, so that users don’t become accustomed to clicking “OK”. –But once created, the TCB prevents the unauthorized retrieval of information from outside this virtual system, or the import of untrusted code into this system. –Question is who sets the rules for information flow, and do we allow overrides (to allow the creation of third party applications that do need access to the information so protected).

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE A Financial Virtual System I might have my financial virtual system. When asked for financially sensitive data, I hit CTL- ALT-DEL to see which virtual system is asking for the data. I create a new virtual systems from trusted media provided by my bank. I can add applications, like quicken, and new participant’s, like my stock broker, to a virtual system only if they have credentials signed by a trusted third party. –Perhaps my bank, perhaps some other entity.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE How Many Virtual Systems Some examples: –My open, untrusted, wild Internet. –My financial virtual system –My employer’s virtual system. –Virtual systems for collaborations ▪ Virtual Organizations –Virtual systems that protect others ▪Might run inside VM’s that protect me –Resolve conflicting policies –DRM vs. Privacy, etc

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Digital Rights Management Strong DRM systems require trust in the systems that receive and process protected content. –Trust is decided by the provider of the content. –This requires that the system provides assurance that the software running on the accessing system is software trusted by the provider.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Privacy and Anti-Trust Concerns The provider decides its basis for trust. –Trusted software may have features that are counter to the interests of the customer. ▪Imposed limits on fair use. ▪Collection and transmission of data the customer considers private. ▪Inability to access the content on alternative platforms, or within an open source O/S.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Trusted Computing Cuts Both Ways The provider-trusted application might be running in a protected environment that doesn’t have access to the user’s private data. –Attempts to access the private data would thus be brought to the users attention and mediate through the trusted path. –The provider still has the right not to provide the content, but at least the surreptitious snooping on the user is exposed.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE What do we need for TC Trust must be grounded –Hardware support ▪How do we trust the hardware ▪Tamper resistance –Embedded encryption key for signing next level certificates. ▪Trusted HW generates signed checksum of the OS and provides new private key to the OS

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Privacy of Trusted Hardware Consider the processor serial number debate over Intel chips. –Many considered it a violation of privacy for software to have ability to uniquely identify the process on which it runs, since this data could be embedded in protocols to track user’s movements and associations. –But Ethernet address is similar, although software allows one to use a different MAC address. –Ethernet addresses are often used in deriving unique identifiers.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE The Key to your Trusted Hardware Does not have to be unique per machine, but uniqueness allows revocation if hardware is known to be compromised. –But what if a whole class of hardware is compromised, if the machine no longer useful for a whole class of applications. Who pays to replace it. A unique key identifes specific machine in use. –Can a signature use a series of unique keys that are not linkable, yet which can be revoked (research problem).

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Non-Maskable Interrupts We must have hardware support for a non-maskable interrupt that will transfer program execution to the Trusted Computing Base (TCB). –This invokes the trusted path

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE OS Support for Trusted Computing (1) Separation of address space –So running processes don’t interfere with one another. Key and certificate management for processes –Process tables contain keys or key identifiers needed by application, and keys must be protected against access by others. –Processes need ability to use the keys.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE OS Support for Trusted Computing (2) Fine grained access controls on persistent resources. –Protects such resources from untrusted applications. The system must protect against actions by the owner of the system.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE SNAIR Architecture Secure Network/Computing Architecture of Interlocking Rings –Multiple rings –Multiple perspectives ▪Process in different rings for different purposes Virtual Systems –Abstraction for isolation –Easier to enforce Depends on Network and OS to provide isolation

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Example of Rings BNK QknBrs WEB OS DRM PRV

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Example - SCADA SCADA systems manage critical infrastructure such as the power grid, pipelines, etc. Isolation is critical in SCADA, but today’s SCADA systems are monolithic, once inside the system, there is little isolation. Need a way to provide isolation for critical functions from non-critical, and for critical functions in different regions.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Critical Functions run in Ring 0 Virtual system centered around the critical function. Supporting hardware and software runs in progressively higher rings. Rules, obligation, and negotiaion determine ring membership from perspecive of critical function. Certain rings impose obligation on hardware, software, or process to provide isolation from other functions/VSs.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Isolation for SCADA Systems Both critical and non-critical functions may share physical infrastructure. The systems and network must, at their lowest levels, provide the separation needed by the critical functions –To prevent compromise or denial of service by the less critical functions –To contain the effect of a compromise of a critical function from spreading to other parts of the system.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Visualizing the Isolation Rules determine membership in rings. Security of the application depends upon the rules that apply to the outermost ring containing functions upon which the function is dependent for correct operation.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE More Examples Digital Rights Mis-Management Protection from Keystroke Loggers –And other malicious code No Phishing Corporate VPN Access Network Admisson Control

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE ID’s as a basis for Authorizaion You may have full access within a virtual system, and to applications within the system it may look like root, but access to other virtual systems will be mediated. UserID’s will be the cross product of users and the virtual systems to which they are allowed access. All accessible resources must be associated with a virtual system.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Current Event Vista and More: Piecing Together Microsoft's DRM Puzzle – Computerworld, November 15. The copy-control technologies baked into Vista and the Windows Media platform cover plenty of ground, but who benefits. If you ask five veteran Windows users to explain Vista's take on digital rights management (DRM), you're likely to get five different answers that have just one thing in common: Whatever it is, they know they don't like it. In a nutshell, this is the dilemma Microsoft faces as it prepares to launch Windows Vista. By any standard, Vista's new DRM capabilities -- aimed at protecting the rights of content owners by placing limits on how consumers can use digital media -- hardly qualify as a selling point; after all, it's hard to sing the praises of technology designed to make life harder for its users.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Current Event (continued) DRM at the hardware level Vista's DRM technologies fall into several distinct categories, all of which are either completely new to the operating system or represent a significant change from the technology found in previous versions of Windows. The Intel-developed Trusted Platform Module (TPM) makes DRM harder to circumvent by extending it beyond the operating system and into the PC's hardware components. TPM is used with Vista's BitLocker full-drive encryption technology to protect a PC's data against security breaches. A TPM microchip embedded on the PC's motherboard stores unique system identifiers along with the BitLocker decryption keys. If a system is tampered with -- for example, if the hard drive is removed and placed in a different machine -- TPM detects the tampering and prevents the drive from being unencrypted.