• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Logic Central Academy

Technological Era Education and Training

  • Contact me
  • Home
  • About
  • Education and Training
    • Cyber Security Courses
      • Cyber Security Career Guidance Series
      • Security Management for Critical infrastructure Series
      • Secure Coding Series
      • Secure Testing Series
    • License Training Material
    • Mentoring
  • Consulting
  • Speaking
  • Categories
    • Business Management
    • Security Management
      • Data Lifecycle Management
      • Trust Management
      • Secrets Management
      • Supply Chain Management
    • Cyber Security
    • Critical Infrastructure
    • Self Help
    • Publications
    • Partners
    • Uncategorized
You are here: Home / Cyber Security / How Does This Work And Security Management Topics Relate To Trusted Computing Group (TCG) And TPM Products?

How Does This Work And Security Management Topics Relate To Trusted Computing Group (TCG) And TPM Products?

August 7, 2014 by admin 6 Comments

Share:
LinkedIn0
Facebook0
Twitter0
Google+0

TTSMgmt-MgmtI have been asked this a few times, so I thought I would post my response……….

During my time working for a TPM manufacturer, we worked extensively on TPM adoption which seemed to be stagnant with the saturated growth phase of the PC industry. The thought at first was to achieve market adoption of TPM products in the Embedded systems space. Doing so was met with much resistance which were mostly cost related as many times the BOM would be doubled with adding a TPM device.  What happened over time was that these markets were driving their own need for trust. This trust was minimal in compared to TCG as the human-User trust center functionality which the PC TPM basis was largely built around was not as relevant.

To make a long story short, what my work and the direction of the industry was moving toward was exactly what my Security Management work on is based on and is precisely what I am advocating with this blog. The needs for the embedded systems market and the Internet of things was to minimalizing trust centers while making them network coordinated. Then adding a eco-system trust model for many devices distributed by both physical network locations and logistic chain or business organization. I see that trust for the next generation will be best suited by groups like tailored Trustworthiness space, (TTS) and other organizations focused on designed-in security, these seem to be more suited to this evolving environment.

The image I displayed here is more accurate to the light weight trust model needed for Trusted Computing in the PC industry. Though currently it does not exist, I believe the market will grow to adopt this type of light weight network trust model. Keep coming back to my blog and help expand this needed area.

If you have suggestions or can help my work in the area, please contact me. Check out my latest article for more content on this.

Link: Why critical infrastructure needs both asynchronous and synchronous components

Filed Under: Cyber Security, Security Management, Trust Management

Reader Interactions

Comments

  1. cheryl says

    August 13, 2014 at 3:49 am

    I think this is interesting. I hadn’t thought of looking at securing entities in the blurring perimeter like this but maybe that is because I think too much about critical devices. Nonetheless, maybe there is a place for them in your security framework. On the other hand it reminds me of an internal corporate network. Assuming there would be layered security inside the trusted network?

    Reply
    • admin says

      August 25, 2014 at 12:12 pm

      Cheryl, what do work do you do with critical devices

      Reply
  2. Rebecca Stark says

    September 3, 2014 at 11:33 pm

    I do consider all of the concepts you have presented on your post.
    They’re really convincing and can certainly work.
    Nonetheless, the posts are very brief for beginners.
    May you please prolong them a little from next time?
    Thank you for the post.

    Reply
    • admin says

      September 18, 2014 at 1:14 pm

      Many of my topics are very difficult and someone could spend an entire lifetime on each one. I am trying to have a balance of brevity but express the relationship between these complex topics. I would love to see that people have an interest in the topic without providing to much content which overwhelms people which are new to the concepts. Please ask questions regarding any of the areas or any of my post that you do not understand or would like more details about and I will provide more details.

      Reply
  3. 4APK.RU says

    March 29, 2016 at 4:50 pm

    People have voiced concerns that trusted computing could be used to keep or discourage users from running software created by companies outside of a small industry group. Microsoft has received a great deal

    Reply
    • admin says

      March 30, 2016 at 4:59 pm

      Trusted Computing is has been viewed as a negative and kept from large scale adoption because it removes anonymity from human to human transactions. At an earlier place and time when the web was a basically a frontier this attitude was wide spread. Like in the days when Pirates were common place on the seas the time of frontier mindsets gives way to a global acceptance that everyone should have accountability for actions. This comes when everyone collectively gets tired of a free for all attitude. With the growth of unmanned IoT devices and the potential of safety problems society of a whole is getting to that tipping point. It is time to define accountability to the actors of virtual transactions.

      Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Christopher Gorog Coffee With Chris Podcast, Listen or join candid talks with the Logic Central Academy Founder. Visit our Media Site.

Connect With Me Online

  • Email
  • Facebook
  • LinkedIn
  • YouTube

RECENT POSTS

  • (no title)
  • Cyber Security needs a Socio-Technological era solution
  • Exciting New High School Concept
  • A Call for Participation in IoT Cyber Research
  • CWC Cyber – Conversation with DHS’s Chuck Brooks

Copyright © 2023 · Genesis Framework · WordPress · Log in