2.13 Unauthorized User Access Part 8: Trusted Platform Model (TPM) Chips

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
9 hours 48 minutes
Difficulty
Intermediate
CEU/CPE
10
Video Transcription
00:00
okay, I mentioned this earlier when we were talking about
00:04
Ah, full drive encryption. I'm just going to reiterate this because this can certainly be an important piece of protecting data. It's the trusted platform module and these air chips that are built on the motherboards. And if you've bought a motherboard in the last 10 years, it's got a T. P M. Chip on it, and they are used for other
00:24
for other means. But what they were designed for was for what we refer to its full drive encryption.
00:31
So let's say I have a file and I'm in the Windows operating system and I right click on the file. It's used to encrypt it.
00:38
That file is encrypted with Windows encrypted file system.
00:42
If the value of what I'm protecting is enough, somebody would just steal my hard drive, take that and put it in a Lennox system.
00:51
Lennox is no respecter of E f s. That's for Windows, right? I'm not saying necessarily. They can read the entire file, but they will be able to get more information than certainly I would want.
01:02
So what encrypted files until what the T P M chip allows is tthe e entire drive the physical device to be encrypted, with the key stored on the motherboard on this chip on the motherboard. So if the drive is removed, there's no access to that hard drive without that key on the motherboard.
01:19
Now the keys can also be stored on thumb drives and be stored in active directory and other means.
01:26
But ultimately, the purpose here is for whole drive encryption.
01:30
Um,
01:32
you know, just of note. Obviously, there's keys before the T. P M chip would want. You'd want to back those up because if they're lost or if they're corrupted, then you may find that the hard drive becomes inaccessible. This isn't necessarily this isn't specific to the cloud, however.
01:49
It's part of a layer defense on individual systems, so certainly a concern.
Up Next
Certified Cloud Security Professional (CCSP)

This Certified Cloud Security Professional (CCSP) certification course covers topics across six domains, to ensure the candidate has a wide range of competencies and is capable in the assessment and implementation of cloud service solutions.

Instructed By