Download - Palladium Cryptography Ppt
![Page 1: Palladium Cryptography Ppt](https://reader030.vdocuments.us/reader030/viewer/2022033008/55cf9cdb550346d033ab4d0b/html5/thumbnails/1.jpg)
Palladium-cryptography(An advanced data security)
![Page 2: Palladium Cryptography Ppt](https://reader030.vdocuments.us/reader030/viewer/2022033008/55cf9cdb550346d033ab4d0b/html5/thumbnails/2.jpg)
DEFINITION
Palladium is the code name for a revolutionary set of features for the windows operating system.
The code name of this initiative –“palladium”, is a moniker drawn from the Greek mythological goddess of wisdom and protector of civilized life or safety.
![Page 3: Palladium Cryptography Ppt](https://reader030.vdocuments.us/reader030/viewer/2022033008/55cf9cdb550346d033ab4d0b/html5/thumbnails/3.jpg)
NEED FOR DATA SECURITY
• Many organizations posses valuable information they guard closely.
• As more of this information is stored in computers the need of data security becomes increasingly important.
![Page 4: Palladium Cryptography Ppt](https://reader030.vdocuments.us/reader030/viewer/2022033008/55cf9cdb550346d033ab4d0b/html5/thumbnails/4.jpg)
THREATS OF DATA:
![Page 5: Palladium Cryptography Ppt](https://reader030.vdocuments.us/reader030/viewer/2022033008/55cf9cdb550346d033ab4d0b/html5/thumbnails/5.jpg)
TYPES OF DATA THREATS:
INTRUDERS: In security literature people who are
nosing around places where they have no business being are called intruders.
VIRUS: Virus is a piece of code that replicates
itself and usually does some damage.
![Page 6: Palladium Cryptography Ppt](https://reader030.vdocuments.us/reader030/viewer/2022033008/55cf9cdb550346d033ab4d0b/html5/thumbnails/6.jpg)
PRESENT DAY DATA SECURITY SYSTEMS:
• Cryptography• User authentication• Anti virus software• Fire walls
![Page 7: Palladium Cryptography Ppt](https://reader030.vdocuments.us/reader030/viewer/2022033008/55cf9cdb550346d033ab4d0b/html5/thumbnails/7.jpg)
PRINCIPLES OF PALLADIUM:
Palladium can be touted as the first technology to develop software-hardware synchronization for better data security.
Palladium is not a separate operating system. It is based in architectural enhancements to the windows kernel.
![Page 8: Palladium Cryptography Ppt](https://reader030.vdocuments.us/reader030/viewer/2022033008/55cf9cdb550346d033ab4d0b/html5/thumbnails/8.jpg)
ASPECTS OF PALLADIUM:
Hardware: Trusted space Sealed storage Secure input and output Attestation
Software: Nexus Trusted agents
![Page 9: Palladium Cryptography Ppt](https://reader030.vdocuments.us/reader030/viewer/2022033008/55cf9cdb550346d033ab4d0b/html5/thumbnails/9.jpg)
WORKING OF PALLADIUM:
Palladium is a new hardware and software architecture.
This architecture will include a new security computing chip and design changes to a computer’s central processing unit (CPU), chipsets, and peripheral devices, such as keyboards and printers.
![Page 10: Palladium Cryptography Ppt](https://reader030.vdocuments.us/reader030/viewer/2022033008/55cf9cdb550346d033ab4d0b/html5/thumbnails/10.jpg)
![Page 11: Palladium Cryptography Ppt](https://reader030.vdocuments.us/reader030/viewer/2022033008/55cf9cdb550346d033ab4d0b/html5/thumbnails/11.jpg)
PROTECTION USING PALLADIUM:
Palladium prevents identity theft and unauthorized
transactions and processes are verifiable and reliable
through the attestable hardware and software architecture and they cannot be imitated. Palladium allows any number of trusted internal or external entities to interact with a trusted component or trusted platform.
![Page 12: Palladium Cryptography Ppt](https://reader030.vdocuments.us/reader030/viewer/2022033008/55cf9cdb550346d033ab4d0b/html5/thumbnails/12.jpg)
PIT FALLS OF PALLADIUM:
Software and applications have to be rewritten to synchronize with palladium or new applications must be written.
Changes are to be made to the existing computer hardware to support palladium.
It would be a long time before this technology
became commonplace.
![Page 13: Palladium Cryptography Ppt](https://reader030.vdocuments.us/reader030/viewer/2022033008/55cf9cdb550346d033ab4d0b/html5/thumbnails/13.jpg)
CASE STUDY: RESTRUCTURING DATA SECURITY OF JNTU
EXAMINATION SYSTEM USING PALLADIUM:
![Page 14: Palladium Cryptography Ppt](https://reader030.vdocuments.us/reader030/viewer/2022033008/55cf9cdb550346d033ab4d0b/html5/thumbnails/14.jpg)
ADVANTAGES
As the process of question paper down load is highly secure, the chances of leakage are literally nil. Since this method is highly trustworthy a single set question paper system can be employed.An advanced system of Internet communication can be adopted for a broader reach, thus eliminating the role of C.D.
![Page 15: Palladium Cryptography Ppt](https://reader030.vdocuments.us/reader030/viewer/2022033008/55cf9cdb550346d033ab4d0b/html5/thumbnails/15.jpg)
CONCLUSION: Today, it managers face tremendous
challenges due to the inherent openness of end-user machines, and millions of people simply avoid some online transactions out of fear. with the usage of “palladium” systems, trustworthy, secure interactions will become possible. This technology will provide tougher security defenses and more abundant privacy benefits than ever before.
![Page 16: Palladium Cryptography Ppt](https://reader030.vdocuments.us/reader030/viewer/2022033008/55cf9cdb550346d033ab4d0b/html5/thumbnails/16.jpg)
![Page 17: Palladium Cryptography Ppt](https://reader030.vdocuments.us/reader030/viewer/2022033008/55cf9cdb550346d033ab4d0b/html5/thumbnails/17.jpg)