1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION  Next Generation Secure Computing Base,formerly known as Palladium.  The aim for palladium is.

Slides:



Advertisements
Similar presentations
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Advertisements

Ljubomir Ivaniš CPU d.o.o.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
 Prof. Dr. M. H. Assal Introduction to Computer AS 26/10/2014.
Vpn-info.com.
1 SECURE-PARTIAL RECONFIGURATION OF FPGAs MSc.Fisnik KRAJA Computer Engineering Department, Faculty Of Information Technology, Polytechnic University of.
TCPA TCPA TCPA T rusted C omputing P latform A lliance Saurabh Phansalkar.
VM: Chapter 5 Guiding Principles for Software Security.
Linux vs. Windows. Linux  Linux was originally built by Linus Torvalds at the University of Helsinki in  Linux is a Unix-like, Kernal-based, fully.
Malicious Logic What is malicious logic Types of malicious logic Defenses Computer Security: Art and Science © Matt Bishop.
Trusted Computing Platforms Blessing or Curse? by Bastian Sopora, Seminar DRM 2006.
ROOTKIT VIRUS by Himanshu Mishra Points to be covered Introduction History Uses Classification Installation and Cloaking Detection Removal.
Security+ Guide to Network Security Fundamentals
Using Secure Coprocessors to Protect Access to Enterprise Networks Dr. José Carlos Brustoloni Dept. Computer Science University of Pittsburgh
Chung Man Ho Willims Chow Man Kei Gary Kwok Pak Wai Lion.
Trusted Computing Initiative Beyond trustworthy. Trusted Computing  Five Key Concepts >Endorsement Key >Secure Input and Output >Memory Curtain / Protected.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Security at the Operating System Level (Microsoft) By Birinder Dhillon.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Three.
Trusted Computing Platform Alliance – Introduction and Technical Overview – Joe Pato HP Labs MIT 6.805/ October 2002.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Electronic Voting (E-Voting) An introduction and review of technology Written By: Larry Brachfeld CS591, December 2010.
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 6: Operating Systems and Data Transmission Basics for Digital Investigations.
outline Purpose Design Implementation Market Conclusion presentation Outline.
AN INTRODUCTION TO LINUX OPERATING SYSTEM Zihui Han.
Firewalls Presented by: Natalie LeCompte, Kara Oliver, Emily Taylor, and Joe Thrower.
Microsoft ® Official Course Module 9 Configuring Applications.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Security in the industry H/W & S/W What is AMD’s ”enhanced virus protection” all about? What’s coming next? Presented by: Micha Moffie.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Patterns for Secure Boot and Secure Storage in Computer Systems By: Hans L¨ohr, Ahmad-Reza Sadeghi, Marcel Winandy Horst G¨ortz Institute for IT Security,
Trusted Computing BY: Sam Ranjbari Billy J. Garcia.
© GlobalSign. A GMO Internet Inc group company. Authentication. Security. Trust. Code Signing Distributing trustworthy software over the Internet.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
Trusted Computing Or How I Learned to Stop Worrying and Love the MPAA.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
Geneva, Switzerland, September 2014 Identity Based Attestation and Open Exchange Protocol (IBOPS) Scott Streit Chief Scientist.
PAPER PRESENTATION ON NETWORK SECURITY ISSUES BY M.D SAMEER YASMEEN SULTHANA.
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
An Introduction to Trusted Platform Technology Siani Pearson Hewlett Packard Laboratories, UK
Malicious Logic and Defenses. Malicious Logic Trojan Horse – A Trojan horse is a program with an overt (documented or known) effect and covert (undocumented.
Chapter 3 Operating System Organization
Paul Cooke - CISSP Director Microsoft Session Code: CLI322.
AUTHORS – X. NIE, D. FENG, J. CHE, X. WANG PRESENTED BY- PREOYATI KHAN KENT STATE UNIVERSITY Design and Implementation of Security Operating System based.
“Trusted” Computing Platform Alliance Eric L. Frederich COT 4810 Nov. 4 th 2004.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
AGENDA Introduction History Version history Features and specifications Android latest Android vs Symbian Android market Advantages of Android Disadvantages.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
Network System Security - Task 2. Russell Johnston.
TULSIRAMJI GAIKWAD-PATIL C OLLEGE OF E NGG. & T ECH. Seminar on “Palladium Cryptography” Presented by Amit S. Wankhade Guided by HoD Prof. Department of.
Chapter 6: Securing the Cloud
LINUX WINDOWS Vs..
Firewalls.
LINUX WINDOWS Vs..
Nessus Vulnerability Scanning
Chapter 2: System Structures
AEGIS: Secure Processor for Certified Execution
Intel Active Management Technology
Erica Burch Jesse Forrest
Presentation transcript:

1 NEW GENERATION SECURE COMPUTING BASE

2 INTRODUCTION  Next Generation Secure Computing Base,formerly known as Palladium.  The aim for palladium is to increase the security and privacy of computer user.  Palladium refers to as a security chip

3 INTRODUCTION (CONT………..)  Internet security is also provided by palladium such as protecting data from virus and hacking of data.  Palladium gives individual & groups of users greater data security,personal privacy & system integrity.

4 Solution :Palladium

5 The fundamental benefit of Palladium fall into three chief categories; Greater system integrity, superior personal privacy & enhanced data security System integrity:Verification of hardware/software component, to what they are and what sealed data they can access.

6 Enhanced data security: Authenticate machine identify keys are stored sealed storage Protect personal privacy: Prevent unauthorized access of personal data from the network

7 CORE PRINCIPLES OF PALLADIUM Palladium comprises two key component :  Hardware  Software

8 HARDWARE COMPONENTS TRUSTED SPACE SEALED STORAGE ATTESTATION

9 TRUSTED SPACE The execution space is protected from external software attacks such as a virus. Trusted space is set up and maintained by nexus.

10 SEALED STORAGE Sealed storage is an authenticated mechanism allows a program to store secrets that cannot be retrieved by no trusted program such as a virus or Trojan horse.

11 ATTESTATION Attestation is a mechanism that allows the user to reveal selected characteristics of the operating environment to external requestor

12 SOFTWARE COMPONENTS NEXUS TRUSTED AGENT

13 NEXUS Technology formerly referred to as the Trusted Operating Root(TOR). The nexus executes in kernel mode in the trusted space. It provides basic services to trusted agents

14 TRUSTED AGENT Trusted agent is a program a part of a program,or a service that runs in user mode in the trusted space A Trusted agent calls the nexus for security related services and critical general services such as memory management

15 Know Element of Palladium The system will store personal data with in an encrypted folder. The system will filter The system has personal information sharing agent called”My Man”. The system will depend on hardware that has either a digital signature or tracking number. The system purports to stop viruses by preventing the running of malicious programs

16 COMPARISON OF TCPA and PALLADIUM TCPA Stands for Trusted Computing Platform Alliance, an initiative led by Intel. Palladium is a software that Microsoft says it plane to incorporate in future version of Window.

17 ADVANTAGES OF PALLADIUM BLOCK MALICIOUS CODE DIGITAL RIGHT MANAGEMENT

18 DISADVANTAGES OF PALLADIUM UPGRADES INTEROPERABILITY LEGACY PROGRAMS

19 CONCLUSION This technology will provide tougher security defenses and more abudnat privacy. Palladium users will have unparallel power over system integrity,Personal privacy and data security. A new generation of Palladium compatible hardware and peripherals will need to design and built. Palladium is not a magic bullet. It provided the trustworthiness necessary to enable business,government and individual to fully embrace the increasing digitization of life.

20 FUTURE ENHANCEMENT Palladium could easily becomes a requirement for future Window Microsoft has been some cool enhancement in 2010 version

21