Today we covered some concepts related to computer architecture. The primary requirement in this domain is the enforcement of security policy pertaining to the architecture and design of computer systems.
A computer system is prone to compromise in terms of confidentiality, integrity, and availability breaches. In order to avoid this, the architecture should enforce certain security mechanisms that prevent unauthorized access by low sensitive entities to high sensitive entities.
The TCSEC, or the Orange Book, advocates a trusted computing base as a requirement. A trusted computing base implements various security mechanisms to protect computer systems. These mechanisms are applicable to security domains, which are segregated as security rings.
Tomorrow we'll move on to discuss the various assurance requirements of trusted systems.