FUNDAMENTALS OF COMPUTER

OPERATING SYSTEMS FOR COMPUTERS

COMPUTER OPERATING SYSTEMS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Essentially a secure cyrptoprocessor that can store cryptographic keys.
A
TPM (Trusted Platform Microprocessor)
B
TPM (Trusted Platform Module)
C
PTM (PlatformTrusted Module)
D
CKL (Crypto Key Logger)
Explanation: 

Detailed explanation-1: -TPM Overview. The TPM is a cryptographic module that enhances computer security and privacy. Protecting data through encryption and decryption, protecting authentication credentials, and proving which software is running on a system are basic functionalities associated with computer security.

Detailed explanation-2: -Each TPM has a master wrapping key, called the storage root key, which is stored within the TPM itself. The private portion of a storage root key, or endorsement key, that is created in a TPM is never exposed to any other component, software, process, or user.

Detailed explanation-3: -On most Windows 10 machines, a TPM is usually integrated into the motherboard to securely store the encryption keys when encrypting the hard drive using features like BitLocker.

Detailed explanation-4: -Cryptographic keys store Rivest-Shamir-Adleman (RSA) encryption keys specific to the host system for hardware authentication. Each TPM chip contains an RSA key pair called the Endorsement Key (EK). The pair is maintained inside the chip and cannot be accessed by software.

There is 1 question to complete.