1/6
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Trusted Platform Module (TPM)
cryptography hardware on a device
What can a TPM do?
random number generator, key generators, burn unique keys, store keys. and is password protected
Hardware Security Module (HSM)
securely stores thousands of cryptographic keys
Where are key management systems held?
On premises or cloud based
Key Management Systems
A system that manages anything to do with your keys
What is a way to protect our many different data?
By using a secure enclave
Secure Enclave
A security processor that are built into the systems that we are using