Explain Trusted Computing Base
Collection of hardware, software, & firmware that provides security and enforces the system’s security policy.
Explain Security Perimeter
Imaginary boundary between trusted TCB and untrusted.
Explain Reference Monitor
Abstract machine that mediates all access subjects have to objects.
Access control concept, not physical.
Explain Security Kernel
Hardware, Software, & Firmware components of the TCB
Enforces the reference monitor concept.