Separating Trusted and Untrusted Components: The Imaginary Line in TCB

The Imaginary Line in TCB

Prev Question Next Question

Question

What can be described as an imaginary line that separates the trusted components of the TCB from those elements that are NOT trusted?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

C.

The security perimeter is the imaginary line that separates the trusted components of the kernel and the Trusted Computing Base (TCB) from those elements that are not trusted.

The reference monitor is an abstract machine that mediates all accesses to objects by subjects.

The security kernel can be software, firmware or hardware components in a trusted system and is the actual instantiation of the reference monitor.

The reference perimeter is not defined and is a distracter.

Source: HARE, Chris, Security Architecture and Models, Area 6 CISSP Open Study Guide, January 2002.

The answer to this question is A. The imaginary line that separates the trusted components of the Trusted Computing Base (TCB) from those elements that are not trusted is referred to as the security kernel.

The TCB is the collection of hardware, software, and firmware components that are responsible for enforcing security policies and controlling access to system resources. The security kernel is the most critical component of the TCB, and it provides the foundation for enforcing the security policies of the system.

The security kernel is responsible for maintaining the integrity and confidentiality of the system by controlling access to resources and enforcing security policies. It is designed to be small, simple, and verifiable, so that it can be trusted to perform its functions correctly.

The security kernel typically includes the operating system's core components, such as the scheduler, memory manager, and device drivers, as well as security-specific components like access control mechanisms and audit logs. These components work together to create a trusted environment that is isolated from the untrusted components of the system.

The reference monitor is another important component of the TCB, but it is not the correct answer to this question. The reference monitor is responsible for mediating access to resources and enforcing security policies, but it does not physically separate the trusted and untrusted components of the TCB.

The security perimeter and the reference perimeter are not valid terms in the context of the TCB and are not the correct answer to this question. The security perimeter refers to the boundary that separates a secure area from an insecure area, while the reference perimeter is not a widely recognized term in the field of computer security.

In summary, the imaginary line that separates the trusted components of the TCB from those elements that are not trusted is referred to as the security kernel.