1 / 8

Applications of Information Security

Applications of Information Security. Dr. Jeff Teo Class 3 June 30, 2009. Deliverables. Lecture on Trusted Computing: Evolution and Direction Review of students’ blogs and assignments

meadow
Download Presentation

Applications of Information Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Applications of Information Security Dr. Jeff Teo Class 3 June 30, 2009

  2. Deliverables • Lecture on Trusted Computing: Evolution and Direction • Review of students’ blogs and assignments • Summarize today’s lecture on Trusted Computing: Evolution and Direction and post at least one blog entry on your blog • Trusted Computing Group • Trusted Platform Module Jeff Teo, Ph.D.

  3. Abstract – page 1 of text • Software-dominated defenses are woefully inadequate • Bellovin 2001 • Hands-on assignment- locate this article • Woefully inadequate- of poor quality, not up to standard, not able to do the job • Who is TCG (Trusted Computing Group)? • http://www.trustedcomputinggroup.org/ • Promotes open standards-based interoperability framework i.e. TCP/IP, 802.11, Ethernet • Promotes the use of both hardware and software to defend against computer attacks • Root of Trust is in hardware – Trusted Platform Module Jeff Teo, Ph.D.

  4. Trusted Platform Module- TPM • What is a Trusted Platform Module -TPM? • Basically a security chip, stores secrets and has a cryptographic engine built-in • Hands-On assignment: tell me the Chinese name of a TPM • Inexpensive, less than US $1.oo in bulk • Hands-On assignment: tell me which chip company makes the TPM • Security is enhanced by specially designed software • Hands-on assignment: tell me which software company writes software for the TPM Jeff Teo, Ph.D.

  5. Is computer security a big problem? • YES! • According to the latest survey, http://i.cmpnet.com/v2.gocsi.com/pdf/CSIsurvey2008.pdf • tremendous loss of time, productivity, information are incurred as a result of computer attacks of various types • Hands-on assignment – tell me the top three types of attacks • Important Question to consider throughout this course • WOULD THE USE OF TRUSTED COMPUTING/TRUSTED PLATFORM MODULE SOLVE THE TOP THREE TYPES OF ATTACKS? Jeff Teo, Ph.D.

  6. Important Question to Answer • WOULD THE USE OF TRUSTED COMPUTING/TRUSTED PLATFORM MODULE SOLVE THE TOP THREE TYPES OF ATTACKS? • If Yes, tell me why and how? • If No, tell me why and how? • Yes and No, tell me why and how? • Answer the above question in the form of a paper (minimum of 4 pages – this is an example of a final examination question). Jeff Teo, Ph.D.

  7. What is Trust? – see page 2 • There are many definitions of trust – McKnight and Chervany 2002 • Trust: the willingness of a party (person, group, company, country) to be vulnerable to the actions of actions of another party based on the expectations that the other would perform a particular action important to the trustor, irrespective of the ability to monitor or control that other party – Mayer 1995 • Vulnerable: without adequate/sufficient protection • Trustor: person trusting • Trustee: person receiving trust Jeff Teo, Ph.D.

  8. Trust in E-commerce • Business and commerce depend on trust • Trust is the foundation of e-commerce, Keen 1999 • 95% of consumers did not want to provide their personal information to web sites and 63% stated that they did not trust the companies collecting the data, Hoffman 1999 • Many researchers have conducted research in trust, especially as it relates to e-commerce • TCG is actively promoting trust in e-commerce by helping deploy trusted computing using TPMs Jeff Teo, Ph.D.

More Related