trusted computing base (TCB)
The trusted computing base (TCB) is everything in a computing system that provides a secure
environment. This includes the operating system and its provided security mechanisms, hardware,
physical locations, network hardware and software, and prescribed procedures. Typically, there are
provisions for controlling access, providing authorization
to specific resources, supporting user authentication,
guarding against viruses and
other forms of system infiltration, and backup of
data. It is assumed that the trusted computing base has been or should be tested or verified.
Contributor(s): Richard Schapker
This was last updated in September 2005
Email Alerts
Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States.
Privacy
More News and Tutorials
-
Adobe Reader X uses Microsoft's sandboxing technology to block potentially dangerous processes from executing beyond the confines of the software.
-
Microsoft repaired four vulnerabilities in its Forefront Unified Access Gateway and a critical flaw in Microsoft Office.
-
Download the entire October 2010 issue of Information Security magazine here in PDF format.
-
Articles
-
Resources from around the Web