SunflowerCISSP Community-crafted CISSP™ mastery
Trusted computing base (TCB) -

Trusted computing base (TCB)

Views: 0
Votes: 0 (Avg 0.0)
The combination of hardware, software, and controls that form a trusted base that enforces your security policy. The totality of protection mechanisms within a computer system, including hardware, software, and communications equipment, the combination of which is responsible for enforcing a security policy. A TCB consists of one or more components that together enforce a unified security policy over a product or system. The ability of a trusted computing base to correctly enforce a security policy depends solely on the mechanisms within the TCB and on the correct input by system administrative personnel of parameters (such as a user’s clearance) related to the security policy. Totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination responsible for enforcing a security policy.
Average rating: 0.0 (0 reviews)
Sign in to manage your flashcard decks and leave a comment.

Discussion (0)

No comments yet. Be the first to share your experience with this term.