Content deleted Content added
No edit summary Tags: Reverted Visual edit Mobile edit Mobile web edit |
remove link |
||
Line 3:
{{textbook|date=February 2020}}
The careful design and implementation of a system's trusted computing base is paramount to its overall security. Modern [[operating system]]s strive to reduce the size of the TCB{{Citation needed lead|date=February 2019}} so that an exhaustive examination of its code base (by means of manual or computer-assisted [[software audit review|software audit]] or [[program verification]]) becomes feasible.
|