Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Platform embedded security technology revealed : safeguarding the future of computing with Intel embedded security and management engine
Ruan X., Apress, Berkeley, CA, 2014. 272 pp. Type: Book (978-1-430265-71-9)
Date Reviewed: Jun 9 2015

This is a great resource for understanding how Intel embeds security technology in hardware. Cybersecurity is a very important topic, and this book truly fills a gap by explaining Intel’s approach in a readable way. It assumes a basic knowledge of security terms. However, it is easy to understand, and it is obvious that the author has good expertise and a solid understanding of the field. According to the publisher, this book will be helpful for a wide audience, including “computer security professionals and researchers, embedded system engineers, and software engineers and vendors who are interested in developing new security applications on top of Intel’s security and management engine.”

The book contains 11 chapters and an index. The first chapter points out that security has become more important with the rise of mobile computing. The author claims that security is the third pillar of mobile computing, after power efficiency and Internet connectivity. Chapter 2 covers Active Management Technology (AMT) and Trusted Platform Module (TPM). It talks about how AMT started as a management tool and then evolved into a security tool. Chapter 3 introduces the features and interfaces of Intel’s security engine. Chapter 4 informs readers about how the security engine can be a backdoor for attackers, as it has many privileges and wide access to system resources. Chapter 5 provides information about Intel’s Enhanced Privacy Identification (EPID) technology. Chapter 6 points out the fact that most security controls are in charge during runtime; however, we have to focus on boot time attacks also. Chapter 7 gives an overview of TPM. Chapter 8 discusses rights management and digital rights management (DRM) schemes. Chapter 9 is about dynamically controlling security mechanisms via the way they exchange information, although they are considered closed doors, as they cannot be changed after manufacture. Chapter 10 is about Intel Identity Protection Technology and how it can be used to prevent identity theft. Chapter 11 addresses the possibility of using today’s security mechanisms for future security breaches. The author reminds readers that creativity is not always about creating new things, but using available things in creative ways.

Every chapter introduces the methods and structures related to the topic. There is a short overview at the beginning of each chapter and a reference section.

More reviews about this item: Amazon

Reviewer:  Gulustan Dogan Review #: CR143502 (1508-0643)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Real-Time And Embedded Systems (C.3 ... )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Real-Time And Embedded Systems": Date
Real-time and systems programming for PCs
Vickery C., McGraw-Hill, Inc., New York, NY, 1993. Type: Book (9780070674660)
Oct 1 1994
Manipulation of terrain data for a real-time display application
Vaughan J., Brookes G., Fletcher M., Wills D. Microprocessors & Microsystems 15(7): 347-353, 1991. Type: Article
Apr 1 1993
Parallel processing in industrial real-time applications
Lawson H., Prentice-Hall, Inc., Upper Saddle River, NJ, 1992. Type: Book (9780136545187)
Jun 1 1994
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy