+ All Categories
Home > Documents > Palladium Cryptography Ppt

Palladium Cryptography Ppt

Date post: 30-Nov-2015
Category:
Upload: palselgonda
View: 316 times
Download: 24 times
Share this document with a friend
Description:
palladium cryptography
Popular Tags:
17
Palladium- cryptography (An advanced data security)
Transcript
Page 1: Palladium Cryptography Ppt

Palladium-cryptography(An advanced data security)

Page 2: Palladium Cryptography Ppt

DEFINITION

Palladium is the code name for a revolutionary set of features for the windows operating system.

The code name of this initiative –“palladium”, is a moniker drawn from the Greek mythological goddess of wisdom and protector of civilized life or safety.

Page 3: Palladium Cryptography Ppt

NEED FOR DATA SECURITY

• Many organizations posses valuable information they guard closely.

• As more of this information is stored in computers the need of data security becomes increasingly important.

Page 4: Palladium Cryptography Ppt

THREATS OF DATA:

Page 5: Palladium Cryptography Ppt

TYPES OF DATA THREATS:

INTRUDERS: In security literature people who are

nosing around places where they have no business being are called intruders.

VIRUS: Virus is a piece of code that replicates

itself and usually does some damage.

Page 6: Palladium Cryptography Ppt

PRESENT DAY DATA SECURITY SYSTEMS:

• Cryptography• User authentication• Anti virus software• Fire walls

Page 7: Palladium Cryptography Ppt

PRINCIPLES OF PALLADIUM:

Palladium can be touted as the first technology to develop software-hardware synchronization for better data security.

Palladium is not a separate operating system. It is based in architectural enhancements to the windows kernel.

Page 8: Palladium Cryptography Ppt

ASPECTS OF PALLADIUM:

Hardware: Trusted space Sealed storage Secure input and output Attestation

Software: Nexus Trusted agents

Page 9: Palladium Cryptography Ppt

WORKING OF PALLADIUM:

Palladium is a new hardware and software architecture.

This architecture will include a new security computing chip and design changes to a computer’s central processing unit (CPU), chipsets, and peripheral devices, such as keyboards and printers.

Page 10: Palladium Cryptography Ppt
Page 11: Palladium Cryptography Ppt

PROTECTION USING PALLADIUM:

Palladium prevents identity theft and unauthorized

transactions and processes are verifiable and reliable

through the attestable hardware and software architecture and they cannot be imitated. Palladium allows any number of trusted internal or external entities to interact with a trusted component or trusted platform.

Page 12: Palladium Cryptography Ppt

PIT FALLS OF PALLADIUM:

Software and applications have to be rewritten to synchronize with palladium or new applications must be written.

Changes are to be made to the existing computer hardware to support palladium.

It would be a long time before this technology

became commonplace.

Page 13: Palladium Cryptography Ppt

CASE STUDY: RESTRUCTURING DATA SECURITY OF JNTU

EXAMINATION SYSTEM USING PALLADIUM:

Page 14: Palladium Cryptography Ppt

ADVANTAGES

As the process of question paper down load is highly secure, the chances of leakage are literally nil. Since this method is highly trustworthy a single set question paper system can be employed.An advanced system of Internet communication can be adopted for a broader reach, thus eliminating the role of C.D.

Page 15: Palladium Cryptography Ppt

CONCLUSION: Today, it managers face tremendous

challenges due to the inherent openness of end-user machines, and millions of people simply avoid some online transactions out of fear. with the usage of “palladium” systems, trustworthy, secure interactions will become possible. This technology will provide tougher security defenses and more abundant privacy benefits than ever before.

Page 16: Palladium Cryptography Ppt
Page 17: Palladium Cryptography Ppt

Recommended