trusted computing base

A trusted computing base is the combination of hardware, software, and firmware components that are responsible for enforcing the security policy of a computer system. It establishes a secure foundation for the rest of the system to build upon and ensures that only authorized actions are allowed to occur.

Requires login.