Trusted Extensions User's Guide

Exit Print View

Updated: July 2014
 
 

Programs That Spoof Users Are Prevented

To “spoof” means to imitate. Intruders sometimes spoof login or other legitimate programs to intercept passwords or other sensitive data. Trusted Extensions protects you from hostile spoofing programs by displaying the following trusted symbol, a clearly recognizable, tamper-proof icon at the top of the screen.

Figure 1-1  Trusted Symbol

image:Graphic shows the Trusted Symbol.

This symbol is displayed whenever you interact with the trusted computing base (TCB). The presence of the symbol ensures the safety of performing security-related transactions. No visible symbol indicates a potential security breach. Figure 1–1 shows the trusted symbol.