{"id":66828,"date":"2023-02-08T14:40:00","date_gmt":"2023-02-08T09:10:00","guid":{"rendered":"https:\/\/cyfuture.cloud\/blog\/?p=66828"},"modified":"2023-03-06T17:47:46","modified_gmt":"2023-03-06T12:17:46","slug":"shielded-computing-vs-traditional-security-measures-which-is-more-effective","status":"publish","type":"post","link":"https:\/\/cyfuture.cloud\/blog\/shielded-computing-vs-traditional-security-measures-which-is-more-effective\/","title":{"rendered":"Shielded computing vs traditional security measures: which is more effective?"},"content":{"rendered":"<div id=\"toc_container\" class=\"no_bullets\"><p class=\"toc_title\">Table of Contents<\/p><ul class=\"toc_list\"><li><a href=\"#What_is_Shielded_Computing\">What is Shielded Computing?<\/a><\/li><li><a href=\"#What_is_TPM_and_how_it_works\">What is TPM and how it works?<\/a><\/li><li><a href=\"#TPM_uses_and_benefits\">TPM uses and benefits<\/a><\/li><li><a href=\"#What_are_Traditional_Security_Measures\">What are Traditional Security Measures?<\/a><\/li><li><a href=\"#Shielded_computing_vs_traditional_security_measures\">Shielded computing vs traditional security measures<\/a><\/li><li><a href=\"#Conclusion\">Conclusion<\/a><\/li><\/ul><\/div>\n\n\n\n<h2><span id=\"What_is_Shielded_Computing\"><strong>What is Shielded Computing?<\/strong><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">A secure computing environment designed to protect against unauthorized access and tampering is known as <\/span><a href=\"https:\/\/cyfuture.cloud\/shielded-computing\"><span style=\"font-weight: 400;\">Shielded computing<\/span><\/a><span style=\"font-weight: 400;\">. The creation of this type of secure environment is typically done by using hardware-based security features, such as a Trusted Platform Module (TPM). This security feature is a microcontroller built into the computer&#8217;s motherboard.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The purpose of the TPM is to store encryption keys, digital certificates, and other secure information, making it possible to create a secure environment even if the computer&#8217;s operating system has been compromised.<\/span><\/p>\n<h2><span id=\"What_is_TPM_and_how_it_works\"><strong>What is TPM and how it works?<\/strong><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The Trusted Platform Module (TPM) is a specialized security chip found in laptops and desktop computers, designed to secure the device with integrated cryptographic keys. It verifies a user&#8217;s identity and authenticates the device, protecting against firmware and ransomware attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A TPM is used in shielded computing for digital rights management (DRM) to protect Windows-based systems and enforce software licenses. It can also be used to store passwords, certificates or encryption keys. This type of security chip can be used with any <\/span><span style=\"font-weight: 400;\">major OS. In conjunction, it works excellently with other security technologies, such as antivirus software, firewalls, smart cards and biometric verification.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A TPM chip contains an Endorsement Key (EK) RSA key pair for secure storage and an Attestation Identity Key (AIK) to protect against unauthorized firmware\/software modifications. The Storage Root Key is created from the EK and owner-specified password. AIK hashes critical components before execution and verifies them with a network server, denying access if modifications are detected.<\/span><\/p>\n<h2><span id=\"TPM_uses_and_benefits\"><strong>TPM uses and benefits<\/strong><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The benefits of using TPMs include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Generation, storage, and control of cryptographic keys.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Platform integrity through change-detection metrics.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Platform authentication using TPM&#8217;s RSA key.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Defense against firmware, ransomware, dictionary, and phishing attacks.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Protection of digital media rights with DRM technology.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Secure protection of software licenses.<\/span><\/li>\n<\/ul>\n<h2><span id=\"What_are_Traditional_Security_Measures\">What are Traditional Security Measures?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">On the other hand, traditional security measures refer to the methods and technologies used to secure physical assets, information, and individuals from unauthorized access, theft, or damage.&nbsp;&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>These traditional security measures include &#8211;<\/strong>&nbsp;<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Physical security:<\/b><span style=\"font-weight: 400;\"> locks, security cameras, guards, fences, etc.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Network security:<\/b> <a href=\"https:\/\/cyfuture.cloud\/network-firewall\"><span style=\"font-weight: 400;\">network firewalls<\/span><\/a><span style=\"font-weight: 400;\">, antivirus software, intrusion detection and prevention systems, etc.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Authentication and access control:<\/b><span style=\"font-weight: 400;\"> passwords, biometric identification, smart cards, etc.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Data encryption:<\/b><span style=\"font-weight: 400;\"> used to protect sensitive information transmitted or stored electronically.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The goal of these measures is to prevent unauthorized access, maintain the confidentiality and integrity of information, and ensure the availability of resources in the event of a security breach.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this article, we will see which is more effective Shielded computing or traditional security measures.&nbsp;<\/span><\/p>\n<h2><span id=\"Shielded_computing_vs_traditional_security_measures\"><span style=\"font-weight: 400;\">Shielded computing vs traditional security measures<\/span><\/span><\/h2>\n<table style=\"height: 1653px; width: 100%; border-collapse: collapse;\" border=\"1\">\n<tbody>\n<tr style=\"height: 68px;\">\n<td style=\"width: 33.3333%; text-align: center; height: 68px;\">\n<p><b>Feature<\/b><\/p>\n<\/td>\n<td style=\"width: 33.3333%; text-align: center; height: 68px;\">\n<p><b>Shielded computing<\/b><\/p>\n<\/td>\n<td style=\"width: 33.3333%; text-align: center; height: 68px;\">\n<p><b>Traditional security measures<\/b><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 262px;\">\n<td style=\"width: 33.3333%; height: 262px;\">\n<p><span style=\"font-weight: 400;\">Definition<\/span><\/p>\n<\/td>\n<td style=\"width: 33.3333%; height: 262px;\">\n<p><span style=\"font-weight: 400;\">A secure computing environment that is designed to protect against unauthorized access and tampering, created using hardware-based security features such as a Trusted Platform Module (TPM).<\/span><\/p>\n<\/td>\n<td style=\"width: 33.3333%; height: 262px;\">\n<p><span style=\"font-weight: 400;\">Software-based security solutions such as antivirus, firewalls, and intrusion detection systems are designed to prevent unauthorized access and protect against security threats.<\/span><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 197px;\">\n<td style=\"width: 33.3333%; height: 197px;\">\n<p><span style=\"font-weight: 400;\">Effectiveness<\/span><\/p>\n<\/td>\n<td style=\"width: 33.3333%; height: 197px;\">\n<p><span style=\"font-weight: 400;\">Provides a secure environment for sensitive information, designed to prevent unauthorized access to data and protect against tampering.<\/span><\/p>\n<\/td>\n<td style=\"width: 33.3333%; height: 197px;\">\n<p><span style=\"font-weight: 400;\">Flexible and can be updated and customized more easily, have a wider range of capabilities, and are typically less expensive.<\/span><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 133px;\">\n<td style=\"width: 33.3333%; height: 133px;\">\n<p><span style=\"font-weight: 400;\">Best for<\/span><\/p>\n<\/td>\n<td style=\"width: 33.3333%; height: 133px;\">\n<p><span style=\"font-weight: 400;\">Organizations with high-security requirements for sensitive information.<\/span><\/p>\n<\/td>\n<td style=\"width: 33.3333%; height: 133px;\">\n<p><span style=\"font-weight: 400;\">Organizations with flexible security needs and limited budgets.<\/span><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 100px;\">\n<td style=\"width: 33.3333%; height: 100px;\">\n<p><span style=\"font-weight: 400;\">Cost<\/span><\/p>\n<\/td>\n<td style=\"width: 33.3333%; height: 100px;\">\n<p><span style=\"font-weight: 400;\">Generally more expensive than traditional security measures.<\/span><\/p>\n<\/td>\n<td style=\"width: 33.3333%; height: 100px;\">\n<p><span style=\"font-weight: 400;\">Typically less expensive than shielded computing.<\/span><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 100px;\">\n<td style=\"width: 33.3333%; height: 100px;\">\n<p><span style=\"font-weight: 400;\">Customizability<\/span><\/p>\n<\/td>\n<td style=\"width: 33.3333%; height: 100px;\">\n<p><span style=\"font-weight: 400;\">Limited, as it relies on hardware-based security features.<\/span><\/p>\n<\/td>\n<td style=\"width: 33.3333%; height: 100px;\">\n<p><span style=\"font-weight: 400;\">More flexible and can be updated and customized more easily.<\/span><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 133px;\">\n<td style=\"width: 33.3333%; height: 133px;\">\n<p><span style=\"font-weight: 400;\">Capabilities<\/span><\/p>\n<\/td>\n<td style=\"width: 33.3333%; height: 133px;\">\n<p><span style=\"font-weight: 400;\">Limited to provide a secure environment for sensitive information.<\/span><\/p>\n<\/td>\n<td style=\"width: 33.3333%; height: 133px;\">\n<p><span style=\"font-weight: 400;\">Can detect and respond to new security threats and have a wider range of capabilities.<\/span><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 165px;\">\n<td style=\"width: 33.3333%; height: 165px;\">\n<p><span style=\"font-weight: 400;\">Complexity is<\/span><\/p>\n<\/td>\n<td style=\"width: 33.3333%; height: 165px;\">\n<p><span style=\"font-weight: 400;\">Maybe more complex to set up and maintain, as it requires specialized hardware and expertise.<\/span><\/p>\n<\/td>\n<td style=\"width: 33.3333%; height: 165px;\">\n<p><span style=\"font-weight: 400;\">Typically easier to set up and maintain, as they are software-based solutions.<\/span><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 165px;\">\n<td style=\"width: 33.3333%; height: 165px;\">\n<p><span style=\"font-weight: 400;\">Scalability<\/span><\/p>\n<\/td>\n<td style=\"width: 33.3333%; height: 165px;\">\n<p><span style=\"font-weight: 400;\">May be less scalable, as adding or upgrading hardware-based security features can be more challenging.<\/span><\/p>\n<\/td>\n<td style=\"width: 33.3333%; height: 165px;\">\n<p><span style=\"font-weight: 400;\">More scalable, as software-based solutions can be easily updated and deployed across multiple systems.<\/span><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 165px;\">\n<td style=\"width: 33.3333%; height: 165px;\">\n<p><span style=\"font-weight: 400;\">Maintenance<\/span><\/p>\n<\/td>\n<td style=\"width: 33.3333%; height: 165px;\">\n<p><span style=\"font-weight: 400;\">Requires regular maintenance and updates to ensure the hardware-based security features functioning properly.<\/span><\/p>\n<\/td>\n<td style=\"width: 33.3333%; height: 165px;\">\n<p><span style=\"font-weight: 400;\">Typically require less maintenance, as updates and patches can be easily applied to software-based solutions.<\/span><\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 165px;\">\n<td style=\"width: 33.3333%; height: 165px;\">\n<p><span style=\"font-weight: 400;\">Integration<\/span><\/p>\n<\/td>\n<td style=\"width: 33.3333%; height: 165px;\">\n<p><span style=\"font-weight: 400;\">May be more difficult to integrate with existing systems, as it requires specialized hardware and expertise.<\/span><\/p>\n<\/td>\n<td style=\"width: 33.3333%; height: 165px;\">\n<p><span style=\"font-weight: 400;\">Typically easier to integrate with existing systems, as software-based solutions can be easily deployed across multiple systems.<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n\n\n<p><span style=\"font-weight: 400;\">Thus, the most effective approach to security between Shielded computing and traditional security will depend on the organisation&#8217;s specific needs.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A combination of shielded computing and traditional security measures is likely the best approach for organisations that need high-security requirements. This will provide the organization with the most comprehensive protection against unauthorized access and tampering and the flexibility and affordability of traditional security measures.<\/span><\/p>\n<h2><span id=\"Conclusion\"><strong>Conclusion<\/strong><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Shielded computing and traditional security measures have their strengths and weaknesses, and the most effective approach depends on the organisation&#8217;s specific security needs. Organizations with high-security requirements should combine both approaches to provide the most comprehensive protection against unauthorized access and tampering.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Table of ContentsWhat is Shielded Computing?What is TPM and how it works?TPM uses and benefitsWhat are Traditional Security Measures?Shielded computing vs traditional security measuresConclusion What is Shielded Computing? A secure computing environment designed to protect against unauthorized access and tampering is known as Shielded computing. The creation of this type of secure environment is typically [&hellip;]<\/p>\n","protected":false},"author":29,"featured_media":66832,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[517],"tags":[514,518],"acf":[],"_links":{"self":[{"href":"https:\/\/cyfuture.cloud\/blog\/wp-json\/wp\/v2\/posts\/66828"}],"collection":[{"href":"https:\/\/cyfuture.cloud\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyfuture.cloud\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyfuture.cloud\/blog\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/cyfuture.cloud\/blog\/wp-json\/wp\/v2\/comments?post=66828"}],"version-history":[{"count":6,"href":"https:\/\/cyfuture.cloud\/blog\/wp-json\/wp\/v2\/posts\/66828\/revisions"}],"predecessor-version":[{"id":67112,"href":"https:\/\/cyfuture.cloud\/blog\/wp-json\/wp\/v2\/posts\/66828\/revisions\/67112"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyfuture.cloud\/blog\/wp-json\/wp\/v2\/media\/66832"}],"wp:attachment":[{"href":"https:\/\/cyfuture.cloud\/blog\/wp-json\/wp\/v2\/media?parent=66828"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyfuture.cloud\/blog\/wp-json\/wp\/v2\/categories?post=66828"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyfuture.cloud\/blog\/wp-json\/wp\/v2\/tags?post=66828"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}