Главная
Study mode:
on
1
Intro
2
Boot state
3
TPM chip
4
Endorsement keys
5
Storage root keys
6
Coppersmith attack
7
T2 chip
8
Apple
9
Disk Encryption
10
eSecurity Encryption
11
eSecurity Performance
12
BitLocker
13
Entropy
14
Measuring entropy
15
Summary
Description:
Explore the critical aspects of trusted computing and secure boot processes in this 31-minute video lecture. Delve into topics such as TPM chips, endorsement keys, storage root keys, and the Coppersmith attack. Learn about Apple's T2 chip, disk encryption techniques, and the importance of entropy in security systems. Gain insights into BitLocker and methods for measuring entropy, enhancing your understanding of eSecurity and trusted host environments.

eSecurity - Trusted Hosts

Bill Buchanan OBE
Add to list