1/5
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
A Trusted Platform Module (TPM)
a dedicated hardware chip that enhances cybersecurity by providing security functions like generating and storing cryptographic keys, authenticating the platform, and ensuring system integrity
Persistent memory
Keys that have been created and burned into a TPM that are unique
Versatile memory
Temporarily holds computations, intermediate keys, or other runtime data
Hardware Security Module (HSM)
a physical device that securely generates, stores, and manages cryptographic keys
Key Management System (KMS)
a system that securely creates, stores, distributes, and manages cryptographic keys
Secure enclave
a protected area of memory or a processor that isolates sensitive data and code from the rest of the system