1/3
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Trusted Platform Module (TPM)
A dedicated microcontroller on a motherboard that securely generates, stores, and limits the use of cryptographic keys and measurements—anchoring platform integrity (secure boot, measured boot) and protecting disk-encryption keys
Hardware Security Module (HSM)
A tamper-resistant, standalone appliance or plug-in card that performs and safeguards cryptographic operations (key generation, signing, decryption) in a certified environment, isolating keys from host systems
Key Management System
An integrated framework (software and policies) for the full lifecycle of cryptographic keys—generation, distribution, rotation, archival, and destruction—ensuring keys remain secure and available when needed
Secure Enclave
A CPU-embedded, isolated execution environment that runs sensitive code and stores critical data (keys, certificates) separately from the main OS, resisting software-level attacks and ensuring confidentiality and integrity