Security Guidelines

Ensure that physical security is satisfied for all your systems. Trusted Computing does not remove the need for physical security, but rather relies on the safety and physical security of its components. As is usually the case, security is as strong as its weakest link, so carefully evaluate how your computing systems might be vulnerable to physical attack. This includes examining how attackers can get access to the computers by simply walking in your company's building, and also how easy it is to open the computers critical to your network. Protections can be as simple as ensuring that either a person or a camera is always looking at the computer, or that it is behind closed and locked doors.

Adapt your Trusted Computing solutions. Personal computers, servers, and mobile smartphones share the same security properties but are very different with regards to the specific requirements and implementation related to these properties. If your system is composed of many mobile platforms, build them using the same Trusted Computing mechanisms to facilitate their management and minimize interaction with the user. In the case of a network of PCs and servers, interoperability is critical and you must ensure that each Trusted Computing system can interact with its potential neighbors on the network.

Was this article helpful?

0 0
The Ultimate Computer Repair Guide

The Ultimate Computer Repair Guide

Read how to maintain and repair any desktop and laptop computer. This Ebook has articles with photos and videos that show detailed step by step pc repair and maintenance procedures. There are many links to online videos that explain how you can build, maintain, speed up, clean, and repair your computer yourself. Put the money that you were going to pay the PC Tech in your own pocket.

Get My Free Ebook


Post a comment