trusted PC
The trusted PC is an industry ideal of a PC with built-in security mechanisms that place minimal reliance on the user or administrator to keep a PC and its peripheral devices secure. Trusted personal computing devices are being developed that maximize the security of individual computers through hardware and operating system-based mechanisms rather than through add-in programs and policies. To that end, security mechanisms are being built into chips, chipsets, and motherboards, among other things, because industry consensus is that hardware-based mechanisms are inherently more trustworthy than those created with software.



Your Guide to Info Sec Certifications
We’ve collected 30+ certifications for you. Which vendor-neutral and vendor-specific security certifications are best for you? Save time by downloading our list organized by experience level.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
The Trusted Computing Platform Alliance (TCPA) was formed in October 1999 by Compaq, HP, IBM, Intel and Microsoft. TCPA, whose membership now includes more than 140 companies, states as its goals: "To develop a specification, based on the collaboration of PC industry platform, operating system, application, and technology vendors, that delivers a set of hardware and operating system security capabilities that customers can use to enhance the trust and security in their computing environments."
Once effective mechanisms are built into the actual computer hardware, security will not be as dependent upon the vigilance of individual administrators as it has been in the past. If the trusted PC works the way it should, an inexperienced or lackadaisical administrator won't be able to unwittingly compromise system or network security through inefficient policies. The idea of a "trusted PC" is similar to the trust relationships that can be set up between networked computers to allow the terminals involved varying degrees of access to each other's data, depending on their requirements and level of trust. The new trusted PC uses the word in a different sense, in that its "trust" is based on hard-wired security - somewhat like trusting children to stay out of the cookie jar because it is locked in a safe.
Dig Deeper on UTM Appliances and Strategies
PRO+
Content
Find more PRO+ content and other member only offers, here.
Start the conversation
0 comments