Date: 02-Mar-2011 to 03-Mar-2011
Venue: Lecture Room 2, N28
Speaker: Mr. Usama
This time seminar was a talk by Mr. Usama from Egypt. He is doing research in Trusted Computing. He is very passionate on his work.. plus I guess he used to be a very good academician. What I could see, he will tried his best in explaining anything throughout his talk until he satisfied that we got the idea on what is he talking about.
He started his talk with few question on security issues.. How secure is our computer? our data? We might secure our data with password or encryption.. but what happen if our data or laptop get stolen? Could we be sure that the hackers could not hack our hard disk or etc once they got the laptop/hard disk, with no time limitation? This is what happen now. Currently system or data only protected using software-based security. There is yet or maybe very few take a look on hardware-based security/protection.
The whole talk is mostly about "Trust". He talked about Trusted Computing Background, Trusted Computing (TC), Trusted Platform (TP), Chain of Trust, Fundamental Features of Trusted Platform, Trusted Computing Group's (TCG) Specifications and Trusted Platform Module (TPM). I could not remember or jot down the details, as again... I was given the impression that the slide will be uploaded to Security Seminar blog.
I did remember that he shown us the mother board which having the Trusted component. With this features, he said, should someone tried to remove the hard disk and hack it using other that it's complete component, all data will be automatically deleted.
That's all I guess as far as I could remember.. for further details, we will have to wait for the slide ok. ;)
No comments:
Post a Comment