What is Trusted Computing?
Trusted Computing (TC) is the concept that technologies have built-in processes to rotate basic security problems and user challenges.
Es ist auch ein Begriff, der von einer Trading group namens Trusted Computing Group (TCG) verwendet wird, die dabei hilft, Standards für Geräte und Technologien zu setzen.
Some elements of trusted computing have to do with making devices uniform so that the security community can apply policies, standards and strategies universally.
Zum Beispiel beinhaltete ein Element des Trusted Computing das Design für sichere Eingabe / Ausgabe. Ingenieure und andere Anwender betrachten verschiedene Arten von Malware wie Spyware und Keylogger, um zu verstehen, wie Systeme vor solchen Angriffen geschützt werden können.
The use of new encryption keys, hash encryption strategies, and other state-of-the-art security standards are also good examples of a trusted computing approach. Over time, the database engineering community has created hashing systems that prevent hackers from capturing many types of data through unauthorized database use.
Through the use of modern security standards, which are used universally for hardware and technology products, an overall safer environment for users is to be created. The not-for-profit Trusted Computing Group benefits from the involvement of major manufacturers and other parties involved in bringing products for business and personal use to the world.
For more information on this term and its potential implications, please visit the TCG website, which lists a number of "secured endpoints" that are officially recognized as having a superior security architecture.