Security Guidelines

Examine application needs carefully. Depending on the applications that your computing systems use, you may have more requirements related to one or two of the four main security properties, thus necessitating a closer look at how you can satisfy these properties. Application needs will also determine what kind of policy you need to enforce and how best to improve application security.

Set up a Public Key Infrastructure (PKI). Cryptography is at the core of Trusted Computing. Cryptography's strength lies in the algorithms used to encrypt, decrypt, and sign data. To use its full power, you need to consider setting up your own PKI to specify your trust model or outsource this system to existing cryptographic service providers. This is a critical step and hopefully one that will enable you not only to enable trusted applications on your system, but also to manage them adequately.

Was this article helpful?

0 0
The Ultimate Computer Repair Guide

The Ultimate Computer Repair Guide

Read how to maintain and repair any desktop and laptop computer. This Ebook has articles with photos and videos that show detailed step by step pc repair and maintenance procedures. There are many links to online videos that explain how you can build, maintain, speed up, clean, and repair your computer yourself. Put the money that you were going to pay the PC Tech in your own pocket.

Get My Free Ebook

Post a comment