单选题
With hundreds of millions of electronic{{U}} {{U}}
41 {{/U}} {{/U}}taking place daily, businesses and organizations have a
strong incentive to protect the{{U}} {{U}} 42 {{/U}} {{/U}}of
the data exchanged in this manner, and to positively ensure the{{U}}
{{U}} 43 {{/U}} {{/U}}of those involved in the transactions. This
has led to an industry-wide quest for better, more secure methods for
controlling IT operations, and for deploying strong security mechanisms deeply
and broadly throughout networked infrastructures and client devices. One of the
more successful concepts to engage the imaginations of the security community
has been the development of standards-based security{{U}} {{U}} 44
{{/U}} {{/U}}that can be incorporated in the hardware design of client
computers. The principle of encapsulating core security capabilities in{{U}}
{{U}} 45 {{/U}} {{/U}}and integrating security provisions at the
deepest levels of the machine operation has significant benefits for both users
and those responsible for securing IT operations.