前往小程序,Get更优阅读体验!
立即前往
首页
学习
活动
专区
工具
TVP
发布
社区首页 >专栏 >CISSP考试指南笔记:3.4 系统安全架构

CISSP考试指南笔记:3.4 系统安全架构

作者头像
血狼debugeeker
发布2020-12-29 11:14:57
2220
发布2020-12-29 11:14:57
举报
文章被收录于专栏:debugeeker的专栏debugeeker的专栏

Security Policy


A security policy is a strategic tool that dictates how sensitive information and resources are to be managed and protected.The security policy is a foundation for the specifications of a system and provides the baseline for evaluating a system after it is built.

Security Architecture Requirements


Trusted Computing Base

The trusted computing base (TCB) is a collection of all the hardware, software, and firmware components within a system that provides some type of security and enforces the system’s security policy.

If the TCB is enabled, then the system has a trusted path, a trusted shell, and system integrity–checking capabilities. A trusted path is a communication channel between the user, or program, and the TCB. The TCB provides protection resources to ensure this channel cannot be compromised in any way. A trusted shell means that someone who is working in that shell (command interpreter) cannot “bust out of it” and other processes cannot “bust into it.”

剩余内容请看本人公众号debugeeker, 链接为CISSP考试指南笔记:3.4 系统安全架构

本文参与 腾讯云自媒体同步曝光计划,分享自作者个人站点/博客。
原始发表:2020-12-26 ,如有侵权请联系 cloudcommunity@tencent.com 删除

本文分享自 作者个人站点/博客 前往查看

如有侵权,请联系 cloudcommunity@tencent.com 删除。

本文参与 腾讯云自媒体同步曝光计划  ,欢迎热爱写作的你一起参与!

评论
登录后参与评论
0 条评论
热度
最新
推荐阅读
目录
  • Security Policy
  • Security Architecture Requirements
    • Trusted Computing Base
    领券
    问题归档专栏文章快讯文章归档关键词归档开发者手册归档开发者手册 Section 归档