This is a great resource for understanding how Intel embeds security technology in hardware. Cybersecurity is a very important topic, and this book truly fills a gap by explaining Intel’s approach in a readable way. It assumes a basic knowledge of security terms. However, it is easy to understand, and it is obvious that the author has good expertise and a solid understanding of the field. According to the publisher, this book will be helpful for a wide audience, including “computer security professionals and researchers, embedded system engineers, and software engineers and vendors who are interested in developing new security applications on top of Intel’s security and management engine.”
The book contains 11 chapters and an index. The first chapter points out that security has become more important with the rise of mobile computing. The author claims that security is the third pillar of mobile computing, after power efficiency and Internet connectivity. Chapter 2 covers Active Management Technology (AMT) and Trusted Platform Module (TPM). It talks about how AMT started as a management tool and then evolved into a security tool. Chapter 3 introduces the features and interfaces of Intel’s security engine. Chapter 4 informs readers about how the security engine can be a backdoor for attackers, as it has many privileges and wide access to system resources. Chapter 5 provides information about Intel’s Enhanced Privacy Identification (EPID) technology. Chapter 6 points out the fact that most security controls are in charge during runtime; however, we have to focus on boot time attacks also. Chapter 7 gives an overview of TPM. Chapter 8 discusses rights management and digital rights management (DRM) schemes. Chapter 9 is about dynamically controlling security mechanisms via the way they exchange information, although they are considered closed doors, as they cannot be changed after manufacture. Chapter 10 is about Intel Identity Protection Technology and how it can be used to prevent identity theft. Chapter 11 addresses the possibility of using today’s security mechanisms for future security breaches. The author reminds readers that creativity is not always about creating new things, but using available things in creative ways.
Every chapter introduces the methods and structures related to the topic. There is a short overview at the beginning of each chapter and a reference section.
More reviews about this item: Amazon