80 likes | 154 Views
Applications of Information Security. Dr. Jeff Teo Class 3 June 30, 2009. Deliverables. Lecture on Trusted Computing: Evolution and Direction Review of students’ blogs and assignments
E N D
Applications of Information Security Dr. Jeff Teo Class 3 June 30, 2009
Deliverables • Lecture on Trusted Computing: Evolution and Direction • Review of students’ blogs and assignments • Summarize today’s lecture on Trusted Computing: Evolution and Direction and post at least one blog entry on your blog • Trusted Computing Group • Trusted Platform Module Jeff Teo, Ph.D.
Abstract – page 1 of text • Software-dominated defenses are woefully inadequate • Bellovin 2001 • Hands-on assignment- locate this article • Woefully inadequate- of poor quality, not up to standard, not able to do the job • Who is TCG (Trusted Computing Group)? • http://www.trustedcomputinggroup.org/ • Promotes open standards-based interoperability framework i.e. TCP/IP, 802.11, Ethernet • Promotes the use of both hardware and software to defend against computer attacks • Root of Trust is in hardware – Trusted Platform Module Jeff Teo, Ph.D.
Trusted Platform Module- TPM • What is a Trusted Platform Module -TPM? • Basically a security chip, stores secrets and has a cryptographic engine built-in • Hands-On assignment: tell me the Chinese name of a TPM • Inexpensive, less than US $1.oo in bulk • Hands-On assignment: tell me which chip company makes the TPM • Security is enhanced by specially designed software • Hands-on assignment: tell me which software company writes software for the TPM Jeff Teo, Ph.D.
Is computer security a big problem? • YES! • According to the latest survey, http://i.cmpnet.com/v2.gocsi.com/pdf/CSIsurvey2008.pdf • tremendous loss of time, productivity, information are incurred as a result of computer attacks of various types • Hands-on assignment – tell me the top three types of attacks • Important Question to consider throughout this course • WOULD THE USE OF TRUSTED COMPUTING/TRUSTED PLATFORM MODULE SOLVE THE TOP THREE TYPES OF ATTACKS? Jeff Teo, Ph.D.
Important Question to Answer • WOULD THE USE OF TRUSTED COMPUTING/TRUSTED PLATFORM MODULE SOLVE THE TOP THREE TYPES OF ATTACKS? • If Yes, tell me why and how? • If No, tell me why and how? • Yes and No, tell me why and how? • Answer the above question in the form of a paper (minimum of 4 pages – this is an example of a final examination question). Jeff Teo, Ph.D.
What is Trust? – see page 2 • There are many definitions of trust – McKnight and Chervany 2002 • Trust: the willingness of a party (person, group, company, country) to be vulnerable to the actions of actions of another party based on the expectations that the other would perform a particular action important to the trustor, irrespective of the ability to monitor or control that other party – Mayer 1995 • Vulnerable: without adequate/sufficient protection • Trustor: person trusting • Trustee: person receiving trust Jeff Teo, Ph.D.
Trust in E-commerce • Business and commerce depend on trust • Trust is the foundation of e-commerce, Keen 1999 • 95% of consumers did not want to provide their personal information to web sites and 63% stated that they did not trust the companies collecting the data, Hoffman 1999 • Many researchers have conducted research in trust, especially as it relates to e-commerce • TCG is actively promoting trust in e-commerce by helping deploy trusted computing using TPMs Jeff Teo, Ph.D.