Content deleted Content added
m Undid revision 717028401 by 103.25.46.100 (talk) removed extra punctuation |
44alexsmith (talk | contribs) m Reworded a statement for additional clarity. |
||
Line 21:
: ''the totality of protection mechanisms within it, including hardware, firmware, and software, the combination of which is responsible for enforcing a computer security policy.''
In other words, trusted computing base(TCB) is a combination of hardware, software, and controls that work together to form a trusted base to enforce your security policy.
The Orange Book further explains that
|