The Bloom Design Group, similarly to other company which uses computer systems in day to day functions, would significantly take advantage of a TCB.
How could a trusted computing base (TCB) function in that company s information system?
Describe briefly the kind of hardware, software, and firmware that might be used within the TCB.
How is the concept of a TCB illustrated by the ring of trust model?
The normal Criteria was instituted to bring together the different safety assessment systems available in the world. By evaluating the ITSEC, TCSEC, as well as other assessment systems, resemblances were mapped one to the other and a general system was created.