Trusted computing base: Difference between revisions

Content deleted Content added
m Undid revision 717028401 by 103.25.46.100 (talk) removed extra punctuation
m Reworded a statement for additional clarity.
Line 21:
 
: ''the totality of protection mechanisms within it, including hardware, firmware, and software, the combination of which is responsible for enforcing a computer security policy.''
 
In other words, trusted computing base(TCB) is a combination of hardware, software, and controls that work together to form a trusted base to enforce your security policy.
 
The Orange Book further explains that