25:
128:
132:
155:
104:
to prevent unauthorized access to, or use of, the system and (b) contains criteria that must be met before specified programs can be accessed.
143:
137:
170:
100:
A self-contained usually small collection of key security-related statements that (a) works as a part of an
75:
108:
34:
79:
39:
59:
112:
82:
101:
94:
164:
147:
90:
86:
71:
93:
that implements the basic security procedures for controlling
18:
32:It has been suggested that this article should be
107:Hardware, firmware, and software elements of a
156:National Information Systems Security Glossary
8:
7:
78:, the central part of a computer or
14:
131: This article incorporates
126:
23:
144:General Services Administration
1:
66:has the following meanings:
187:
38:into multiple articles. (
76:communications security
139:Federal Standard 1037C
133:public domain material
109:trusted computing base
16:Telecommunication term
171:Computing terminology
80:communications system
97:to system resources.
111:that implement the
60:telecommunications
113:reference monitor
56:
55:
178:
152:
151:
146:. Archived from
130:
129:
102:operating system
51:
48:
27:
26:
19:
186:
185:
181:
180:
179:
177:
176:
175:
161:
160:
136:
127:
125:
122:
64:security kernel
52:
46:
43:
28:
24:
17:
12:
11:
5:
184:
182:
174:
173:
163:
162:
159:
158:
153:
150:on 2022-01-22.
121:
118:
117:
116:
105:
98:
54:
53:
31:
29:
22:
15:
13:
10:
9:
6:
4:
3:
2:
183:
172:
169:
168:
166:
157:
154:
149:
145:
141:
140:
134:
124:
123:
119:
114:
110:
106:
103:
99:
96:
92:
88:
84:
81:
77:
73:
69:
68:
67:
65:
61:
50:
47:February 2023
41:
37:
36:
30:
21:
20:
148:the original
138:
63:
57:
44:
33:
62:, the term
120:References
165:Category
115:concept.
91:software
87:firmware
83:hardware
72:computer
40:discuss
95:access
89:, and
135:from
35:split
74:and
70:In
58:In
42:)
167::
142:.
85:,
49:)
45:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.