84:
recognized that the rise of the
Internet simultaneously increased societal reliance on computer systems while increasing the vulnerability of such systems to failure and produced an important report in 1999, "Trust in Cyberspace". This report reviews the cost of un-trustworthy systems and identifies
209:
102:"...had been under fire from some of its larger customers–government agencies, financial companies and others–about the security problems in Windows, issues that were being brought front and center by a series of self-replicating worms and embarrassing attacks."
206:
123:
Four areas were identified as the initiative's key areas: Security, Privacy, Reliability, and
Business Integrity, and despite some initial scepticism, at its 10-year anniversary it was generally accepted as having
216:, a transcript of the March 12, 1992 hearing before the Subcommittee on Science of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred Second Congress, Second Session, Hon.
492:
69:
as
Microsoft had not yet developed one. The success of the web had caught them by surprise but by mid 1995, they were testing their own web server, and on August 24, 1995, launched a major
577:
447:
96:
launched
Microsoft's "Trustworthy Computing" initiative with a January 15, 2002 memo, referencing an internal whitepaper by Microsoft CTO and Senior Vice President
352:
428:
484:
466:
312:
547:
553:
335:
598:
406:
385:
292:. Microsoft, May 26, 1995. Made publicly available at United States Department of Justice. United States v. Microsoft Trial Exhibits.
444:
81:
231:
285:
261:
536:
182:
362:
178:
515:
603:
425:
149:
171:
OGC-00-33R Department of
Commerce: Relationship with the Internet Corporation for Assigned Names and Numbers
463:
302:
57:
On, May 26, 1995, Bill Gates sent the "Internet Tidal Wave" memorandum to
Microsoft executives assigning
593:
105:
332:
401:
559:
382:
8:
129:
133:
35:
20:
571:
137:
282:
470:
451:
432:
410:
389:
339:
289:
213:
243:
70:
565:
392:, 1999, final report of the "Committee on Information System Trustworthiness".
257:
587:
169:
217:
97:
117:
74:
66:
93:
62:
357:
307:
232:"Retiring the NSFNET Backbone Service: Chronicling the End of an Era"
39:
16:
Computing systems that are inherently secure, available, and reliable
445:"Era Ends With Break Up of Trustworthy Computing Group at Microsoft"
51:
50:
Until 1995, there were restrictions on commercial traffic over the
485:"The Business World Owes A Lot To Microsoft Trustworthy Computing"
38:, available, and reliable. It is particularly associated with the
413:, From: Bill Gates Sent: Tuesday, January 15, 2002, wired.com.
128:. The Trustworthy Computing campaign was the main reason why
109:
34:) has been applied to computing systems that are inherently
229:
113:
464:"10 years ago today: Bill Gates kicks arse over security"
100:. The move was reportedly prompted by the fact that they
513:
541:
88:
59:"...the Internet this highest level of importance..."
454:, September 19, 2014, Dennis Fisher, Threatpost.com.
568:, Committee on Information Systems Trustworthiness
585:
435:, (revised October 2002 version), Microsoft.com.
200:
516:"Why no Easter Eggs? – Larry Osterman's WebLog"
42:initiative of the same name, launched in 2002.
548:The Age of Corporate Open Source Enlightenment
473:, January 15, 2012, John Leyden, The Register.
426:"Trustworthy Computing, Microsoft White Paper"
303:"Microsoft – The History of Internet Explorer"
126:"...made a positive impact on the industry..."
560:Email from Bill Gates to Microsoft Employees
482:
230:Susan R. Harris; Elise Gerich (April 1996).
162:
544:Managing Trusted Computing Platforms (TPM)
333:"A Brief History of Microsoft on the Web"
421:
419:
556:, Catherine Flick, University of Sydney
438:
586:
554:The Controversy over Trusted Computing
476:
416:
514:Osterman , Larry (21 October 2005).
457:
220:, subcommittee chairman, presiding.
89:Microsoft and Trustworthy Computing
13:
495:from the original on July 29, 2017
188:from the original on June 15, 2009
85:actions required for improvement.
14:
615:
599:Information technology management
530:
258:"A Brief History of the Internet"
403:"Subject: Trustworthy computing"
179:Government Accountability Office
507:
395:
315:from the original on 2005-10-01
264:from the original on 2015-08-11
483:Tony Bradley (March 5, 2014).
376:
345:
326:
295:
275:
250:
223:
150:Security Development Lifecycle
140:and other Microsoft products.
1:
342:, Dave Cramer, Microsoft.com.
155:
7:
562:, Wired News, January, 2002
181:. July 7, 2000. p. 6.
143:
10:
620:
353:"MSN Historical Time line"
45:
18:
580:, Craig Mundie, Microsoft
82:National Research Council
550:, Paul Ferris, ACM Press
520:blogs.msdn.microsoft.com
19:Not to be confused with
537:Trusted Computing Group
283:The Internet Tidal Wave
65:was released without a
604:Microsoft initiatives
578:Trustworthy Computing
572:Trustworthy Computing
383:"Trust in Cyberspace"
28:Trustworthy Computing
207:Management of NSFNET
566:Trust in Cyberspace
242:(4). Archived from
542:Wave Systems Corp.
469:2015-06-26 at the
450:2015-06-26 at the
431:2015-06-26 at the
409:2015-06-26 at the
388:2016-03-04 at the
338:2008-05-14 at the
288:2009-07-15 at the
212:2013-07-28 at the
594:Computer security
132:disappeared from
21:Trusted Computing
611:
524:
523:
511:
505:
504:
502:
500:
480:
474:
461:
455:
442:
436:
423:
414:
399:
393:
380:
374:
373:
371:
370:
361:. Archived from
349:
343:
330:
324:
323:
321:
320:
299:
293:
279:
273:
272:
270:
269:
254:
248:
247:
227:
221:
204:
198:
197:
195:
193:
187:
176:
166:
61:but Microsoft's
619:
618:
614:
613:
612:
610:
609:
608:
584:
583:
533:
528:
527:
512:
508:
498:
496:
481:
477:
471:Wayback Machine
462:
458:
452:Wayback Machine
443:
439:
433:Wayback Machine
424:
417:
411:Wayback Machine
400:
396:
390:Wayback Machine
381:
377:
368:
366:
351:
350:
346:
340:Wayback Machine
331:
327:
318:
316:
301:
300:
296:
290:Wayback Machine
280:
276:
267:
265:
256:
255:
251:
228:
224:
214:Wayback Machine
205:
201:
191:
189:
185:
174:
168:
167:
163:
158:
146:
91:
48:
24:
17:
12:
11:
5:
617:
607:
606:
601:
596:
582:
581:
575:
569:
563:
557:
551:
545:
539:
532:
531:External links
529:
526:
525:
506:
475:
456:
437:
415:
394:
375:
344:
325:
294:
281:Gates, Bill –
274:
249:
246:on 2015-03-17.
222:
199:
160:
159:
157:
154:
153:
152:
145:
142:
90:
87:
71:online service
47:
44:
15:
9:
6:
4:
3:
2:
616:
605:
602:
600:
597:
595:
592:
591:
589:
579:
576:
573:
570:
567:
564:
561:
558:
555:
552:
549:
546:
543:
540:
538:
535:
534:
521:
517:
510:
494:
490:
486:
479:
472:
468:
465:
460:
453:
449:
446:
441:
434:
430:
427:
422:
420:
412:
408:
405:
404:
398:
391:
387:
384:
379:
365:on 2005-06-18
364:
360:
359:
354:
348:
341:
337:
334:
329:
314:
310:
309:
304:
298:
291:
287:
284:
278:
263:
259:
253:
245:
241:
237:
233:
226:
219:
215:
211:
208:
203:
184:
180:
173:
172:
165:
161:
151:
148:
147:
141:
139:
135:
131:
127:
121:
119:
115:
111:
107:
103:
99:
95:
86:
83:
78:
76:
72:
68:
64:
60:
55:
53:
43:
41:
37:
33:
29:
22:
519:
509:
497:. Retrieved
488:
478:
459:
440:
402:
397:
378:
367:. Retrieved
363:the original
356:
347:
328:
317:. Retrieved
306:
297:
277:
266:. Retrieved
252:
244:the original
239:
235:
225:
218:Rick Boucher
202:
190:. Retrieved
170:
164:
125:
122:
101:
98:Craig Mundie
92:
79:
58:
56:
49:
31:
27:
25:
574:, Microsoft
499:December 2,
130:Easter eggs
67:web browser
588:Categories
489:Forbes.com
369:2006-07-03
319:2007-02-06
268:2015-06-25
236:ConneXions
156:References
94:Bill Gates
63:Windows 95
358:Microsoft
308:Microsoft
40:Microsoft
26:The term
493:Archived
467:Archived
448:Archived
429:Archived
407:Archived
386:Archived
336:Archived
313:Archived
286:Archived
262:Archived
210:Archived
192:June 25,
183:Archived
144:See also
106:Code Red
104:such as
52:Internet
134:Windows
118:Slammer
46:History
138:Office
36:secure
186:(PDF)
175:(PDF)
110:Nimda
501:2017
194:2015
116:and
114:Klez
80:The
75:MSN
32:TwC
590::
518:.
491:.
487:.
418:^
355:.
311:.
305:.
260:.
240:10
238:.
234:.
177:.
136:,
120:.
112:,
108:,
77:.
73:,
54:.
522:.
503:.
372:.
322:.
271:.
196:.
30:(
23:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.