Trusted Computing In Cyber Security