Trusted computing base: Difference between revisions

Content deleted Content added
See also: add Black box, {{Portal|Information technology}}
m Definition and characterization: corrected formatting
Line 22:
: ''the totality of protection mechanisms within it, including hardware, firmware, and software, the combination of which is responsible for enforcing a computer security policy.''
 
In other words, trusted computing base (TCB) is a combination of hardware, software, and controls that work together to form a trusted base to enforce your security policy.
 
The Orange Book further explains that