Content deleted Content added
Shiftchange (talk | contribs) |
m →Definition and characterization: corrected formatting |
||
Line 22:
: ''the totality of protection mechanisms within it, including hardware, firmware, and software, the combination of which is responsible for enforcing a computer security policy.''
In other words, trusted computing base (TCB) is a combination of hardware, software, and controls that work together to form a trusted base to enforce your security policy.
The Orange Book further explains that
|