93.3k views
1 vote
Which piece of the Trusted Computing Base's security system manages access controls?

a. trusted computing base
b. reference monitor
c. covert channel
d. verification module

User Solata
by
7.6k points

1 Answer

4 votes

Final answer:

The reference monitor is the component of the Trusted Computing Base that manages access controls, ensuring security policy compliance and integrity of data.

Step-by-step explanation:

The piece of the Trusted Computing Base's security system that manages access controls is the reference monitor. The reference monitor is the component of the Trusted Computing Base that manages access controls, ensuring security policy compliance and integrity of data.

The reference monitor is an abstract machine that mediates all accesses to objects by subjects, ensuring that these are in accordance with the established security policy.

This component is crucial in maintaining the system's security because it enforces access controls at a level that cannot be bypassed, which is essential for the integrity and confidentiality of the data within the system.

User Rene Pickhardt
by
8.8k points