Trusted Computing Base: Hardware, Firmware, and Software Elements

Trusted Computing Base

Prev Question Next Question

Question

What is defined as the hardware, firmware and software elements of a trusted computing base that implement the reference monitor concept?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

C.

A security kernel is defined as the hardware, firmware and software elements of a trusted computing base that implement the reference monitor concept.

A reference monitor is a system component that enforces access controls on an object.

A protection domain consists of the execution and memory space assigned to each process.

The use of protection rings is a scheme that supports multiple protection domains.

Source: KRUTZ, Ronald L.

& VINES, Russel.

D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 5: Security Architecture and Models (page 194).

The answer is C. A security kernel.

Trusted Computing Base (TCB) is a collection of hardware, firmware, and software components that work together to provide a secure computing environment. The reference monitor is a critical concept in TCB design. It is responsible for enforcing access controls and ensuring that security policies are implemented.

The security kernel is the core component of the TCB that implements the reference monitor concept. It is responsible for enforcing the security policy and ensuring that only authorized actions can be performed. The security kernel is designed to be as small as possible to minimize the potential for vulnerabilities.

Protection rings are a mechanism for implementing privilege levels in a computer system. They are used to control access to system resources and provide a way to separate the operating system and user applications. However, protection rings are not directly related to the TCB.

A protection domain is a group of resources that are protected by a specific security policy. It is a way of defining a boundary between different parts of a system to ensure that unauthorized access is prevented. However, a protection domain is not directly related to the TCB.

In summary, the security kernel is the component of the TCB that implements the reference monitor concept. It is responsible for enforcing security policies and ensuring that only authorized actions can be performed.