У нас вы можете посмотреть бесплатно Trusted Computing Base (TCB) или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
This video discussed the Trusted Computing Base (TCB) and its various components including Reference Monitor, Security Kernel, Security Perimeter, Trusted Paths. 0:00:39 TCB Intro: TCB is a subset of the computer system which comprises of critical and sensitive Hardware, Software and Controls of the computer system. 0:01:00 Security Perimeter: TCB is separated from rest of computer system (non-TCB components) using Security Perimeter. Security Perimeter is an imaginary boundary around the TCB which prevents any insecure communication between TCB components and non-TCB components. 0:01:27 Trusted Paths: Access between TCB components and non-TCB components is allowed only using the Trusted Paths, which are secure channel of communication between the TCB components and non-TCB components. 0:01:44 TCB and TCSEC (Orange Book): TCB is defined by the Trusted Computer System Evaluation Criteria(TCSEC), also known as Orange Book. Orange book was formulated by US Department of Defense in 1980s and it is now replaced by the Common Criteria in 2005. But the definition of TCB (in Orange Book) is still valid today. Orange book defines TCB as a Trusted Base which contains the subset of computer system comprises of critical and sensitive Hardware, Software and Controls. TCB enforces the Security Policy of the computer system. Trusted Computing Base (TCB) should be small enough to allow and an easy analysis by security expert. 0:02:54 TCB Parts (Reference Monitor & Security Kernel): There are two parts of TCB, 1st one is Reference Monitor which is a conceptual part of TCB and it mediates all accesses from non-TCB components to TCB components. 2nd part is the Security Kernel which is the implementation of Reference Monitor. 0:03:21 Reference Monitor: Reference monitor is a logical/ conceptual part of this TCB and it contains the access rules to allow access between subjects and objects. It validates accesses between subjects and objects b/w non-TCB components and TCB components. It also defines the security policy of this computer system. 0:03:49 Security Kernel: Security Kernel is the actual implementation of this TCB/ Reference Monitor. Reference Monitor is like a Law and Security Kernel is like a Police, which enforces the implementation of the law. Security Kernel is set of Software Hardware and Controls to implement the functions of Reference Monitor. Security kernel enforces the access rules and Security Policy of TCB/ Computer system. Reference (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 8th Edition: https://www.amazon.com/Certified-Info... Links to Channel's Playlists Information Security Management: • Due Care & Due Diligence - Information Sec... Network Security: • Virtual Private Network (VPN) - Animation ... Information Security Architecture: • Authentication Methods, Attacks & Controls Information Security Operations: • USB History Viewer (without any Software) Information Security Testing: • hackthebox (HTB) Invitation Code - Less th... Application Security: • cross site scripting Cyber Security: • NASA got Hacked Subscribe to Channel: / @cybersecurityentertainment