Vulnerabilities in Trusted Platform Modules

Introduction


With ever-changing technical methods, the digital world has seen remarkable success throughout the years. The evolution of gadgets and equipment has contributed in the transformation of the world into a global village. People in different regions of the world may readily exchange ideas with each other in this day and age because communication is so quick from one place to another. Notwithstanding the enormous success linked with ever-changing global trends, the sector is also confronted with serious and vicious acts of crime that render advancing technology destructive. The Trusted Platform Module is a design plan which is created with the aim of increasing the security and defense of information shared over a specific media. The module can be applied in the form of a hardware device or as a software component which has specific encryption keys which are used to verify the users and the information being transmitted. Therefore, this paper seeks to assess the authorization protocols, the vulnerabilities of TPM, the particular applications of TPM and the future research direction while assessing the implications of TPM in an e-commerce environment.


Authorization Protocols of TPM


The Trusted Platform Modules is primarily established with specific authorization protocols with the aim of safeguarding the information from malicious individuals. In a situation where the TPM is set as a hardware device, a microchip is normally placed in the internal processor of the machines and at the same time connected to the motherboard. Vacca in his sentiments highlights that the major aim of the move is to ensure that the internal and the external activities of the given machine are easily monitored and any discrepancy can easily be assessed and removed from the system (Vacca, 2013). Additionally, the microchip also aids in rooting out any possibility of tampering with the machine parts of the information stored inside. Conventionally, any module chip from a Trusted Computing Group harbors a pair of RSA keys which are known as Endorsement Keys and the Root Storage Key. The keys are highly sensitive and are enclosed in the chip and cannot be retrieved by any type of software. The Endorsement Keys contain a password which is owner-defined and thus not accessible to any other individual. Another key available in the system is the Attestation Key which plays the key primary role of guarding the whole system against any unapproved access through software and firmware. Therefore, all these protocols tend to keep the system in check and guarantee the privacy and security of the information on the system.


Vulnerabilities of TPM


Despite the huge success associated with the Trusted Platform Modules, there are some isolated cases where there has been some hitch in the overall functionality of the system. The demerits can either be mild or severe basing on the extent of damage exposed to the devices. Markantonakis, in his book, explains that technology cannot always work a hundred percent certainty because through this there is room to invent and come up with diverse technological advancements (Markantonakis, 2016). One of the major challenges faced by the module is the existence of hackers who can bypass the system and retrieve information which is very substantial to the institution. Despite most of the Trusted Platform Companies ruling out the possibility of hacking into the system, they blame such happenings on the availabilities of back doors. Liu and Chang support this hypothesis citing that most people in major companies cannot let go the opportunity of easily making it quick hence the idea of backdoors should not be put at bay (Liu and Chang, 2012). Another major vulnerability which the systems can be exposed to is the software attack. The programs in any device are user-generated and hence the user might choose to crush or access information for their own selfish gains. Hackers can easily root access into the system and improve mechanisms through which they can corrupt the information hence damaging a trusted platform. An example is the Linux Kernel which has been frequently attacked thus implying that 'trusted' does not necessarily mean 'trustworthy.' In this aspect, it is clear that any machine either trusted or non-trusted there is a possibility of breakage. Therefore, it is advisable such modules should be established with a backup module which can safeguard information before they can be corrupted completely or leaked to unwanted sources which may induce harm.


Significance and Conclusion


Through the assessment of such modules and protocols, young minds can be challenged to improvise mechanisms to establish an unbeatable trusted platform module. Hence this report seeks to check on the challenges and significance of the modules hence pointing out the specific areas which are of great concern. Alternatively, Vacca outwardly points out by evaluating the various loopholes which undermine trusted modules one can easily determine the best option for storing vital information (Vacca, 2013). Conclusively, it is evident the changing technological world has seen both the significance of the significance of the Trusted Platform Modules and their disadvantages to the corporate world.


References


Liu, B., & Chang, J. (2012). Information computing and applications: Third international conference, ICICA 2012, Chengde, China, September 14-16, 2012. Proceedings. Berlin: Springer.


Markantonakis, K. (2016). Secure smart embedded devices, platforms and applications. S.L.: Springer-Verlag New York.


Vacca, J. R. (2013). Computer and information security handbook. Amsterdam [u.a.: Morgan Kaufmann.

Deadline is approaching?

Wait no more. Let us write you an essay from scratch

Receive Paper In 3 Hours
Calculate the Price
275 words
First order 15%
Total Price:
$38.07 $38.07
Calculating ellipsis
Hire an expert
This discount is valid only for orders of new customer and with the total more than 25$
This sample could have been used by your fellow student... Get your own unique essay on any topic and submit it by the deadline.

Find Out the Cost of Your Paper

Get Price