System Security Architecture Flashcards

1
Q

Explain Trusted Computing Base

A

Collection of hardware, software, & firmware that provides security and enforces the system’s security policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain Security Perimeter

A

Imaginary boundary between trusted TCB and untrusted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain Reference Monitor

A

Abstract machine that mediates all access subjects have to objects.
Access control concept, not physical.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain Security Kernel

A

Hardware, Software, & Firmware components of the TCB

Enforces the reference monitor concept.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly