Trustworthy Computing Next - Download Center - Microsoft

Feb 28, 2012 - email, instant messaging, video-calling, social networking, social ...... .com/seattle/2011/05/sony-attack-launched-from-amazon-cloud.html ...
690KB Sizes 27 Downloads 181 Views
Trustworthy Computing Next

Scott Charney* Corporate Vice President Trustworthy Computing Microsoft Corporation February 28, 2012 Version 1.01

* This paper benefited from the many reviewers who provided substantive comments and helped to shape this paper. Please see Appendix A for a list of contributors.

1

Trustworthy Computing Next Contents

I.

Trustworthy Computing – An Introduction .................................................................................................. 3

II.

The World Changes, Yet Again ......................................................................................................................... 4 A.

Living in a Data-Centric World ..................................................................................................................... 4

B.

The Role of Governments ............................................................................................................................... 8

C.

The TwC Pillars .................................................................................................................................................... 9

III.

Security ............................................................................................................................................................... 11 A.

Background....................................................................................................................................................... 11

B.

The Evolving Threat Model – Living With Persistent and Determined Adversaries ............... 14

C.

The Cloud and Big Data ............................................................................................................................... 15

IV.

Privacy................................................................................................................................................................. 17

A.

Background....................................................................................................................................................... 17

B.

The Cloud and Big Data ............................................................................................................................... 18

C.

Government Access to Data ....................................................................................................................... 23

V.

1.

Domestic Investigations ........................................................................................................................... 24

2.

International Investigations .................................................................................................................... 25

Reliability ................................................................................................................................................................ 29 A.

Background....................................................................................................................................................... 29

B.

The Cloud .......................................................................................................................................................... 31

VI.

Conclusion ......................................................................................................................................................... 34

2

1. Trustworthy Computing – An Introduction On January 15, 2002, Bill Gates sent a memorandum to all Microsoft employees announcing the Trustworthy Computing (TwC) Initiative.1 In that m