单选题
With hundreds of millions of
electronic{{U}} {{U}} 66 {{/U}} {{/U}}taking place daily,
businesses and organizations have a strong incentive to protect the{{U}}
{{U}} 67 {{/U}} {{/U}}of the data exchanged in this manner, and to
positively ensure the{{U}} {{U}} 68 {{/U}} {{/U}}of those
involved in the transactions. This has led to an industry-wide quest for better,
more secure methods for controlling IT operations, and for deploying
strong security mechanisms deeply and broadly throughout networked
infrastructures and client devices. One of the more successful concepts to
engage the imaginations of the security community has been the development of
standards-based security{{U}} {{U}} 69 {{/U}} {{/U}}that can be
incorporated in the hardware design of client computers. The principle of
encapsulating core security capabilities in{{U}} {{U}} 70
{{/U}} {{/U}}and integrating security provisions at the deepest levels
of the machine operation has significant benefits for both users and those
responsible for securing IT operations.