Intro to Programming Database Internet of Things IT Project Management Networking Web Development Security For Research Students

Introduction

Physical security deals with securing the physical computing devices using things like locks. The current contents are:

Any questions or comments should be directed to: The creator's email

Trusted Platform Module

Many modern computers have a built-in encryption chip called the Trusted Platform Module (TPM). This chip can be used to uniquely identify the computer. It can also be used to (for example) encrypt the computer's hard disk so it cannot be read on another computer or be used as a password to authenticate the computer's user when connecting to remote devices.

One weakness of TPMs is whenever the motherboard of the computer burns out, anything encrypted with the TPM becomes unusable.

On Windows, you can check your TPM information in powershell, by typing:

get-tpmendorsementkeyinfo

On Linux, the equivalent command is:

dmesg | grep -i tpm

dmesg is the command to produce logs of information produced by the linux kernel- the core of the operating system. grep is a filter command. The -i option in grep means do a case insensitive search. Basically, the command means filter all messages from dmesg, only display the messages containing "tpm".

Any questions or comments should be directed to: The creator's email