Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
PALLADIUM
#1

Palladium is the codename for an evolutionary set of features for Microsoft Windows operating system. When compared with a new breed of hardware and applications, these features will give individuals and group of users greater data security, personnel privacy and system integrity. Palladium provides a solid basis for trust to perform more and more important financial, legal and other transactions: a foundation on which privacy-and security-service software can be built. The hardware part is based on Intel's "Trusted Computing Platform Alliance"(TCPA), which provides for a monitoring and reporting component to be mounted in PC.

TCPA /Palladium provides a platform on which one can't tamper with the applications, and where these applications can communicate securely with the vendor.In June 2002, Microsoft released information regarding its new "Palladium" initiative. Palladium is a system that combines software and hardware controls to create a "trusted" computing platform. In doing so, it would establish an unprecedented level of control over users and their computers.

Palladium could place Microsoft as the gatekeeper of identification and authentication. Additionally, systems embedded in both software and hardware would control access to content, thereby creating ubiquitous schemes that can track users and control use of media. Microsoft expects to have elements of the system in place by 2004.
Known Elements of the Palladium System are:-

a).The system purports to stop viruses by preventing the running of malicious programs.
b).The system will store personal data within an encrypted folder.
c).The system will depend on hardware that has either a digital signature or a tracking number.
d).The system will filter spam.
e).The system has a personal information sharing agent called "My Man."
f).The system will incorporate Digital Rights Management technologies for media files of all types (music, documents, e-mail communications). Additionally, the system purports to transmit data within the computer via encrypted paths.
Reply

#2

[attachment=14955]
Abstract:
SECURITY in this contemporary scenarios has become a more sensible issue either it may be in the REAL WORLD or in the CYBER WORLD . In the real world as opposed to the cyber world an attack is often preceded by information gathering. Movie gangsters case the joint ; soldiers scout the area . This is also true in the cyber world. Here the bad guys are referred to as intruders, eavesdroppers, hackers, hijackers, etc. The intruders would first have a panoramic view of the victim s network and then start digging the holes. Today the illicit activities of the hackers are growing by leaps and bounds, viz., THE RECENT ATTACK ON THE DNS SERVERS HAS CAUSED A LOT OF HULLABALOO ALL OVER THE WORLD . However, fortunately, the antagonists reacted promptly and resurrected the Internet world from the brink of prostration.
Newton s law says Every action has got an equal but opposite reaction . So is the case with this. Nevertheless the security breaches and eavesdroppers, the technological prowess has been stupendously developed to defy against each of the assaults. Our paper covers the ADVANCED technical combats that have been devised all through the way, thus giving birth to the notion of NETWORK -SECURITY . Various antidotes that are in fact inextricable with security issues are Cryptography, Authentication, Integrity and Non Repudiation, Key Distribution and certification, Access control by implementing Firewalls etc.
To satiate the flaws in the network security more and more advanced security notions are being devised day by day. Our paper covers a wide perspective of such arenas where the contemporary cyber world is revolving around viz., THE DMZ ZONE, PALLADIUM CRYPTOGRAPHY, IP Sec & KERBEROS AUTHENTICATION SYSTEM.
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

Powered By MyBB, © 2002-2024 iAndrew & Melroy van den Berg.