1 NEW GENERATION SECURE COMPUTING BASE
2 INTRODUCTION Next Generation Secure Computing Base,formerly known as Palladium. The aim for palladium is to increase the security and privacy of computer user. Palladium refers to as a security chip
3 INTRODUCTION (CONT………..) Internet security is also provided by palladium such as protecting data from virus and hacking of data. Palladium gives individual & groups of users greater data security,personal privacy & system integrity.
4 Solution :Palladium
5 The fundamental benefit of Palladium fall into three chief categories; Greater system integrity, superior personal privacy & enhanced data security System integrity:Verification of hardware/software component, to what they are and what sealed data they can access.
6 Enhanced data security: Authenticate machine identify keys are stored sealed storage Protect personal privacy: Prevent unauthorized access of personal data from the network
7 CORE PRINCIPLES OF PALLADIUM Palladium comprises two key component : Hardware Software
8 HARDWARE COMPONENTS TRUSTED SPACE SEALED STORAGE ATTESTATION
9 TRUSTED SPACE The execution space is protected from external software attacks such as a virus. Trusted space is set up and maintained by nexus.
10 SEALED STORAGE Sealed storage is an authenticated mechanism allows a program to store secrets that cannot be retrieved by no trusted program such as a virus or Trojan horse.
11 ATTESTATION Attestation is a mechanism that allows the user to reveal selected characteristics of the operating environment to external requestor
12 SOFTWARE COMPONENTS NEXUS TRUSTED AGENT
13 NEXUS Technology formerly referred to as the Trusted Operating Root(TOR). The nexus executes in kernel mode in the trusted space. It provides basic services to trusted agents
14 TRUSTED AGENT Trusted agent is a program a part of a program,or a service that runs in user mode in the trusted space A Trusted agent calls the nexus for security related services and critical general services such as memory management
15 Know Element of Palladium The system will store personal data with in an encrypted folder. The system will filter The system has personal information sharing agent called”My Man”. The system will depend on hardware that has either a digital signature or tracking number. The system purports to stop viruses by preventing the running of malicious programs
16 COMPARISON OF TCPA and PALLADIUM TCPA Stands for Trusted Computing Platform Alliance, an initiative led by Intel. Palladium is a software that Microsoft says it plane to incorporate in future version of Window.
17 ADVANTAGES OF PALLADIUM BLOCK MALICIOUS CODE DIGITAL RIGHT MANAGEMENT
18 DISADVANTAGES OF PALLADIUM UPGRADES INTEROPERABILITY LEGACY PROGRAMS
19 CONCLUSION This technology will provide tougher security defenses and more abudnat privacy. Palladium users will have unparallel power over system integrity,Personal privacy and data security. A new generation of Palladium compatible hardware and peripherals will need to design and built. Palladium is not a magic bullet. It provided the trustworthiness necessary to enable business,government and individual to fully embrace the increasing digitization of life.
20 FUTURE ENHANCEMENT Palladium could easily becomes a requirement for future Window Microsoft has been some cool enhancement in 2010 version
21