Trusted Computing Base

The trusted computing base (TCB) of a computer system is the set of all hardware, firmware, and/or software components that are critical to its security, in the sense that bugs or vulnerabilities occurring inside the TCB might jeopardize the security properties of the entire system. By contrast, parts of a computer system outside the TCB must not be able to misbehave in a way that would leak any more privileges than are granted to them in accordance to the security policy.

The careful design and implementation of a system's trusted computing base is paramount to its overall security. Modern operating systems strive to reduce the size of the TCB so that an exhaustive examination of its code base (by means of manual or computer-assisted software audit or program verification) becomes feasible.

Read more about Trusted Computing Base:  Definition and Characterization, Examples

Famous quotes containing the words trusted and/or base:

    Man, her last work, who seemed so fair,
    Such splendid purpose in his eyes,
    Who rolled the psalm to wintry skies,
    Who built him fanes of fruitless prayer,

    Who trusted God was love indeed
    And love Creation’s final law—
    Though Nature, red in tooth and claw
    With ravine, shrieked against his creed—
    Alfred Tennyson (1809–1892)

    Yet herein will I imitate the sun,
    Who doth permit the base contagious clouds
    To smother up his beauty from the world,
    That when he please again to be himself,
    Being wanted, he may be more wondered at
    By breaking through the foul and ugly mists
    Of vapors that did seem to strangle him
    William Shakespeare (1564–1616)