InvestorsHub Logo
Followers 99
Posts 8760
Boards Moderated 0
Alias Born 07/21/2003

Re: None

Saturday, 10/23/2010 11:49:39 AM

Saturday, October 23, 2010 11:49:39 AM

Post# of 249063
A reminder from AWK

Intermediate update day 2 NSA Conference

TCG in Action at the NSA Trusted Computing Conference and Exposition, Orlando, FL: Day 2by TCG in Action

Why do we need a hardware-based root of trust? Neal Ziring, Director, Information Assurance Directorate, NSA made it quite clear in his presentation. "There is no such thing as software that isn't vulnerable," he said.

Information in the cloud brings even further challenges. "We need to be able to repose trust," said Ziring. That is far from the extent of where NSA experts want to go. He noted that control systems and SCADA is a hot topic in the government these days and it is an area that is ripe for improvement. A subsequent session dealt specifically with TCG's TNC and the recent extension of IF-MAP 2.0.

In his concluding remarks Ziring noted, "The security landscape is changing and we are moving into an era where real-time dynamic defense is going to become much more important and we need to see how trusted computing technologies can aid that."

Virtualization was the first area discussed by an industry supplier. Dr. Ian Pratt, Vice-President, Advanced Products, Citrix Systems, Inc. explained the role that hardware plays in virtualization and hypervisors to enhance security. "It enables us to take advantage of all the hardware features to assist virtualization which is built into the platform over the last few years by the CPU vendors/chipset vendors." he said.

Citrix has worked with CPU manufacturers since about 2001 discussing features that it would like to see in the CPU to simplify its software. "We can also make use of the Trusted Platform Module and Intel TXT execution technology. It enables us to build a bridge of trust on our hypervisor," said Pratt.

Bill Ross, director, Cyber Mission Assurance Systems (CMAS), Information Assurance Division, General Dynamics C4 Systems gave a case study approach to his company's recent efforts involving security. He noted in his presentation the importance of TCG in the standards. "The fundamental premise or underpinnings of the High Assurance Platform is the Trusted Computing Group," he said.

Within the last four years significant progress has occurred. "Trusted Computing Group is getting more and more mass, and getting more and more relevance," said Ross. "As cyber security takes root, you are going to see more and more major enterprises start to adopt some of the principles of the Trusted Computing Group."

More to come...

http://www.trustedcomputinggroup.org/community/2010/09/tcg_in_action_at_the_nsa_trusted_computing_conference_and_exposition_orlando_fl_day_

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.