Video Description

This lesson covers trusted computing and which consists of the following components: • System architecture • Trusted Computer Base (TCB) o Security Perimeter o Reference Monitor o Security Kernel

Course Modules

ISC2 CISSP