Trusted path

Trusted path

A trusted path is simply some mechanism that provides confidence that the user is communicating with what the user intended to communicate with, ensuring that attackers can't intercept or modify whatever information is being communicated.

As such it is the counterpart to needing trustworthy channels in that it assures users that they really are working with the program or system they intended to use.

The traditional example is a 'fake login' program (e.g.: a program is written to look like the login screen of a system, as in Login spoofing). When users try to log in, the fake login program can then capture user passwords for later use.

For the Windows operating system a trusted path is supported by the hardware when the user presses Ctrl+Alt+Del prior to logging in. The function of the Ctrl+Alt+Del keystroke is to cause the system to interrupt any program that may be impersonationg the login dialog and hence provides a trusted path to the Windows OS login.


Wikimedia Foundation. 2010.

Игры ⚽ Поможем написать реферат

Look at other dictionaries:

  • Trusted Path — Dienst eines (Betriebs )Systems, bei dem der Benutzer die Möglichkeit besitzt, einen ununterbrechbaren und nicht ausspionierbaren Dialog mit dem System zu führen, definiert im Orange Book …   Acronyms

  • Trusted Path — Dienst eines (Betriebs )Systems, bei dem der Benutzer die Möglichkeit besitzt, einen ununterbrechbaren und nicht ausspionierbaren Dialog mit dem System zu führen, definiert im Orange Book …   Acronyms von A bis Z

  • Trusted Computing — (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning. With Trusted Computing the computer will consistently behave in specific ways, and… …   Wikipedia

  • Trusted Information Systems — This article refers to the Trusted Information Systems that was purchased by McAfee in 1998 and operates under that name. For information on that company, please see the article Mcafee. This article is about the computer security company Trusted… …   Wikipedia

  • Certification path validation algorithm — The certification path validation algorithm is the algorithm which verifies that a given certificate path is valid under a given public key infrastructure (PKI). A path starts with the Subject certificate and proceeds through a number of… …   Wikipedia

  • List of Fire Emblem: Path of Radiance characters — The group from Path of Radiance that appeared on Nasir s ship. Distinguished from left to right: Oscar, Rolf, Boyd, Mist, Mordecai, Lethe, Titania, Zihark, Rhys, Ike, Nephenee, Soren (front), Gatrie (back), Brom, Shinon, Mia (front), Marcia… …   Wikipedia

  • Critical Path Institute — (C Path) is an independent, non profit organization committed to transformational improvement of the drug development process. An international leader in forming collaborations around this mission, C Path has established first of its kind, global …   Wikipedia

  • Delegated Path Discovery — For the German parcel service DPD, see: Deutscher Paket Dienst Delegated Path Discovery (DPD) is a method for querying a trusted server for information about a public key certificate. DPD allows clients to obtain collated certificate information… …   Wikipedia

  • Open Shortest Path First — (OSPF) is an adaptive routing protocol for Internet Protocol (IP) networks. It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS). It is defined as OSPF… …   Wikipedia

  • Protected Media Path — The Protected Media Path is a set of technologies creating a Protected Environment, first included in Microsoft s Windows Vista operating system, that is used to enforce digital rights management (or DRM) protections on content. Its subsets are… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”