Content deleted Content added
Maxeto0910 (talk | contribs) No edit summary |
|||
Line 1:
{{short description|Set of all computer components critical to its security}}
{{textbook|date=February 2020}}▼
{{distinguish|Trusted Computing}}
▲{{textbook|date=February 2020}}
The '''trusted computing base''' ('''TCB''') of a [[computer system]] is the set of all [[Computer hardware|hardware]], [[firmware]], and/or [[software]] components that are critical to its [[computer security|security]], in the sense that [[Software bug|bugs]] or [[Vulnerability (computing)|vulnerabilities]] occurring inside the TCB might jeopardize the security properties of the entire system. By contrast, parts of a computer system that lie outside the TCB must not be able to misbehave in a way that would leak any more [[privilege (computer science)|privilege]]s than are granted to them in accordance to the system's [[security policy]].
|