Reply To: OCU C)SP B Week 02 Lesson 05 Discussion
One type of control a company could implement to help secure its network is TPM. TPM is a trusted platform module used to encrypt servers’ hard drives and memory. By using TPM companies will secure their networks by encrypting their data in a way that’s only readable to the person or people with the correct key to the encryption. This means that if someone happens to steal the physical drive from the company they won’t be able to use the information unless they manage to find the right key. TPM also proves the integrity of the system or computer by checking the IP or MAC address to ensure that the computer is supposed to have those encryption data collections. According to Intel, “A TPM, or a trusted platform module, is a physical or embedded security technology (microcontroller) that resides on a computer’s motherboard or in its processor. TPMs use cryptography to help securely store essential and critical information on PCs to enable platform authentication.”
(n.d.). What Is a Trusted Platform Module? Intel. Retrieved November 24, 2024, from https://www.intel.com/content/www/us/en/business/enterprise-computers/resources/trusted-platform-module.html#:~:text=A%20TPM%2C%20or%20a%20trusted,PCs%20to%20enable%20platform%20authentication.