Analysis of Pin and TPM for Microsoft Laptops

Organizations routinely face risk trade-offs. Broadly modeling a system can act as decision support in the face of significant uncertainty about an organizations threats, vulnerabilities, and defenses. This paper gives an example of a policy brief discussing the security of different security configurations for laptops at a large organization.