Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Computer security and Trusted Platform Module

Shortcuts: Differences, Similarities, Jaccard Similarity Coefficient, References.

Difference between Computer security and Trusted Platform Module

Computer security vs. Trusted Platform Module

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide. Trusted Platform Module (TPM, also known as ISO/IEC 11889) is an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys.

Similarities between Computer security and Trusted Platform Module

Computer security and Trusted Platform Module have 16 things in common (in Unionpedia): Advanced Encryption Standard, Application software, Authentication, Common Criteria, Disk encryption, Google, Hardware security, Keystroke logging, Microsoft, National Institute of Standards and Technology, Operating system, Password, Public-key cryptography, Symmetric-key algorithm, Threat model, United States Department of Defense.

Advanced Encryption Standard

The Advanced Encryption Standard (AES), also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.

Advanced Encryption Standard and Computer security · Advanced Encryption Standard and Trusted Platform Module · See more »

Application software

An application software (app or application for short) is a computer software designed to perform a group of coordinated functions, tasks, or activities for the benefit of the user.

Application software and Computer security · Application software and Trusted Platform Module · See more »

Authentication

Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.

Authentication and Computer security · Authentication and Trusted Platform Module · See more »

Common Criteria

The Common Criteria for Information Technology Security Evaluation (abbreviated as Common Criteria or CC) is an international standard (ISO/IEC 15408) for computer security certification.

Common Criteria and Computer security · Common Criteria and Trusted Platform Module · See more »

Disk encryption

Disk encryption is a technology which protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people.

Computer security and Disk encryption · Disk encryption and Trusted Platform Module · See more »

Google

Google LLC is an American multinational technology company that specializes in Internet-related services and products, which include online advertising technologies, search engine, cloud computing, software, and hardware.

Computer security and Google · Google and Trusted Platform Module · See more »

Hardware security

Hardware security as a discipline originated out of cryptographic engineering and involves hardware design, access control, secure multi-party computation, secure key storage, ensuring code authenticity, measures to ensure that the supply chain that built the product is secure among other things.

Computer security and Hardware security · Hardware security and Trusted Platform Module · See more »

Keystroke logging

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.

Computer security and Keystroke logging · Keystroke logging and Trusted Platform Module · See more »

Microsoft

Microsoft Corporation (abbreviated as MS) is an American multinational technology company with headquarters in Redmond, Washington.

Computer security and Microsoft · Microsoft and Trusted Platform Module · See more »

National Institute of Standards and Technology

The National Institute of Standards and Technology (NIST) is one of the oldest physical science laboratories in the United States.

Computer security and National Institute of Standards and Technology · National Institute of Standards and Technology and Trusted Platform Module · See more »

Operating system

An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.

Computer security and Operating system · Operating system and Trusted Platform Module · See more »

Password

A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which is to be kept secret from those not allowed access.

Computer security and Password · Password and Trusted Platform Module · See more »

Public-key cryptography

Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.

Computer security and Public-key cryptography · Public-key cryptography and Trusted Platform Module · See more »

Symmetric-key algorithm

Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext.

Computer security and Symmetric-key algorithm · Symmetric-key algorithm and Trusted Platform Module · See more »

Threat model

Threat modeling is a process by which potential threats, such as structural vulnerabilities can be identified, enumerated, and prioritized – all from a hypothetical attacker’s point of view.

Computer security and Threat model · Threat model and Trusted Platform Module · See more »

United States Department of Defense

The Department of Defense (DoD, USDOD, or DOD) is an executive branch department of the federal government of the United States charged with coordinating and supervising all agencies and functions of the government concerned directly with national security and the United States Armed Forces.

Computer security and United States Department of Defense · Trusted Platform Module and United States Department of Defense · See more »

The list above answers the following questions

Computer security and Trusted Platform Module Comparison

Computer security has 428 relations, while Trusted Platform Module has 116. As they have in common 16, the Jaccard index is 2.94% = 16 / (428 + 116).

References

This article shows the relationship between Computer security and Trusted Platform Module. To access each article from which the information was extracted, please visit:

Hey! We are on Facebook now! »