Trusted computing base: Difference between revisions

Content deleted Content added
No edit summary
Line 1:
{{short description|Set of all computer components critical to its security}}
{{textbook|date=February 2020}}
{{distinguish|Trusted Computing}}
{{textbook|date=February 2020}}
 
The '''trusted computing base''' ('''TCB''') of a [[computer system]] is the set of all [[Computer hardware|hardware]], [[firmware]], and/or [[software]] components that are critical to its [[computer security|security]], in the sense that [[Software bug|bugs]] or [[Vulnerability (computing)|vulnerabilities]] occurring inside the TCB might jeopardize the security properties of the entire system. By contrast, parts of a computer system that lie outside the TCB must not be able to misbehave in a way that would leak any more [[privilege (computer science)|privilege]]s than are granted to them in accordance to the system's [[security policy]].