1/8
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Trusted Platform Module (TPM)
Cryptography hardware on device
Cryptographic Processor
Persistent Memory
Versatile memory
Password Protected
Cryptographic Processor
RNG, key generator
Persistent Memory
Unique Keys (Uniquely tied to hardware)
Versatile Memory
Store keys on local machine
Password Protected
No attacks
Hardware Security Module (HSM)
Large Device
Secure Storage
Encrypt Data (Fast)
Plug in Device/Plug-in card
Cryptographic Accelerators (Lower CPU Overhead of connecting devices)
Key Management System
Mangement console for all keys
Features:
Automatic Key Rotation
Associate Key with user
Log Key use
Keeping Data Private
Issue:
Data is always changing
Resolution?
Secure Enclave
CPU dedicated for data privacy
Monitors all processes on a system
RNG
Real-time encryption