|
Anleitung Zusammenfassung
System Requirements • Intel® Desktop Boards Executive Series • Microsoft Windows* XP Professional (SP2), Microsoft Windows Vista*, or Microsoft Windows* 7 operating system • NTFS file system • Microsoft Internet Explorer 5.5 or later • Adobe* Acrobat* 5.0 or later Security Precautions Security, like any other aspect of computer maintenance, requires planning. What is unique about security has to do with understanding who "friends" are and who adversaries are. The TPM provides mechanisms to enable the owner/user to protect their information from adversaries. To provide this protection, the TPM effectively puts "locks" around the data. Just like physical locks, if keys or combinations are lost, the assets (data) may be inaccessible not only to adversaries, but also to the asset owner/user. The TPM provides two classes of keys: migratable and nonmigratable. Migratable keys are designed to protect data that can be used (unencrypted) on more than one platform. One advantage is allowing the key data to be replicated (backed up and restored) to another platform. This may be because of user convenience (someone uses more than one platform, or the data needs to be available to more than one person operating on different platforms). Another advantage to this type of key is that it can be backed up and restored from a defective platform onto a new platform. Trusted Platform Module (TPM) Quick Reference Guide However, migratable keys may not be the appropriate level of protection needed for the application when the user wants the data restricted to a single platform. This requires a nonmigratable key. Non-migratable keys carry with them a usage deficit in that while the key may be backed up and restored (protected from hard disk failure) they are not protected against system or TPM failure. The very nature of a nonmigratable key is that they can be used on one and only one TPM. In the event of a system or TPM failure, all nonmigratable keys and the data associated with them will be inaccessible and unrecoverable. The following precautions and procedures may assist in recovering from any of the previously listed situations. Failure to implement these security precautions and procedures may result in unrecoverable data loss. Password Procedures The Wave* Systems EMBASSY* Security Center software allows users to configure passwords from 8 to 255 characters. A good password should consist of: • At least one upper case letter (A to Z) • At least one numerical character (0 to 9) • At least one symbol character (!, @, &, etc.) Example Passwords: “I wear a Brown hat 2 worK @ least once- a-month” or “uJGFak&%)adf35a9m” NOTE Avoid using names or dates that can be easily guessed, such as birthdays, anniversaries, family member names, or pet names. All passwords associated with the EMBASSY Security Center (owner, TPM Key Archive, and other archives) are NOT RECOVERABLE and cannot be reset without the original text. The system owner should document all passwords, store them in a secured location (a vault, safe deposit box, or off-site storage), and have them available for future use. These documents should be updated after any password changes are made. Trusted Platform Module (TPM) Quick Reference Guide Emergency Recovery File Backup Procedures Use the EMBA...
Dieses Handbuch ist für folgende Modelle:PC Desktops - Intel® Desktop Board DQ57TML (51.99 kb)
PC Desktops - Intel® Desktop Board DQ67EP (51.99 kb)
PC Desktops - Intel® Desktop Board DQ67OW (51.99 kb)
PC Desktops - Intel® Desktop Board DQ67SW (51.99 kb)