Professional Documents
Culture Documents
Presentation at
Conclusion
Osman Bakar (2007) Environmental Wisdom for Planet Earth: The Islamic Heritage. Centre for Civilisational Dialogue University Malaya
3rd March 2010 © 2010 MIMOS Berhad. All Rights Reserved. 3
Introduction – Today’s Optimized Technology
Usage & Platform
What it is NOT
Server
Data Application
Security Model
Desired Platform
Architecture Design
Consideration
Trust Model
Network
Client
Passwords, anti virus & TPM-based user authentication Server
Operating System patches, configuration and policy control
Security Kernel – TPM based trusted software layer (storage, GUI, etc)
Application
Virtualization (Management of Resource, Memory, IO, etc) Data
Hardware Independent
Server
Encryption (IPSec, SSL, M’sian Crypto) & TPM-based Authentication Strength: Strong Client Platforms
TPM-based VPN & Layered Firewalls help Defense In-depth
Intrusion Detection & prevention & 24hrs monitoring Security Strategy
Multi factor Authentication, TPM-based Network Access Control, Network
Segmentation, RADIUS & access control
Domain Controllers, Configuration monitors, policy management
Network
Data Application
Encrypted document
Trusted document
Trust Manager
TPM
TPM
Attest/Issue TPM Attest/request Sealing/ retrieve
Domain CA Certificate
Archive
Policy
Encrypted document
Trusted document
Trust Manager
TPM
TPM
Attest/Issue TPM Attest/request Sealing/ Transaction
Certificate
Domain CA
Banks
Policy
Mobile Manager
Services
Request with
SIM Policy
MTM
MTM
Policy
Applications
Cloud Computing
Applications
Trusted
Compartment
Cloud Computing
Policy
Trust
Models:
Security Threat
Goals: s:
• Education Background
– B Eng (Electrical Engineering) 1981
– M Sc (Microprocessor Engineering) 1987
– PhD (Electronics & Communications Engg) 1995
• Work Experience (29 years)
– Academic (17.5 years)
– Industry (11.5 years)
• Work in Information Security
– Network Security (8 years)
– Trusted Computing (3 years)
– Privacy Enhancing Technologies (6 months)