Options for securing PCs against phishing and espionage: A report from the EU-project open trusted computing

0Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Private and business PC users will continue to experience attacks from viruses and Trojan horses. The latter might, e.g., eavesdrop on banking passwords or send confidential business data to a criminal. It is very difficult to provide protection from such attacks on private information within the current operating systems. Novel approaches to securing such data outside the user's main operating system, using virtualization techniques are presented here. The transparency and trustworthiness of such approaches are, however, by no means guaranteed. In order to protect users, the development of such approaches could be monitored and influenced at the political level, e.g. by governments procuring such systems. © 2011 Springer Science+Business Media B.V.

Cite

CITATION STYLE

APA

Weber, A., & Weber, D. (2011). Options for securing PCs against phishing and espionage: A report from the EU-project open trusted computing. In Computers, Privacy and Data Protection: an Element of Choice (pp. 201–207). Springer Netherlands. https://doi.org/10.1007/978-94-007-0641-5_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free