System Security Architecture Flashcards
1
Q
Explain Trusted Computing Base
A
Collection of hardware, software, & firmware that provides security and enforces the system’s security policy.
2
Q
Explain Security Perimeter
A
Imaginary boundary between trusted TCB and untrusted.
3
Q
Explain Reference Monitor
A
Abstract machine that mediates all access subjects have to objects.
Access control concept, not physical.
4
Q
Explain Security Kernel
A
Hardware, Software, & Firmware components of the TCB
Enforces the reference monitor concept.