Security Capability of Information System … Trusted Computing Base

In computer systems, establishing the level of assurance based on the defined security models so that the computer system can be trusted for use in critical infrastructure is called trusted computing.

The following are some of the concepts that relate to information security aspects of a trusted computing architecture:

Trusted Computing Base

It defines – How a vendor should develop its Hardware, Software, Firmware to establish some level of Trust on CIA – Originally Documented in Orange Book.

Trusted Computing Base
Trusted Computing Base

Organizations must understand the security capabilities of any information systems that they implement. This section discusses memory protection, virtualization, Trusted Platform Module, interfaces, and fault tolerance.

other security capabilities
other security capabilities

Organizations can implement different policy mechanisms to increase the security of information systems.

Policy Mechanism
Policy Mechanism
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.