TCB


Short for trusted computing base. TCB refers to the totality of protection mechanisms (hardware, firmware and software) that provide a secure computing environment. The TCB includes everything that must be trusted — access control, authorization and authentication procedures, cryptography, firewalls, virus protection, data backup, and even human administration — in order for the right level of security to work.

Read Also:

  • TCO

    Abbreviation of Total Cost of Ownership, a very popular buzzword representing how much it actually costs to own a PC. The TCO includes: Original cost of the computer and software Hardware and software upgrades Maintenance Technical support Training Most estimates place the TCO at about 3 to 4 times the actual purchase cost of the […]

  • Transmission Control Protocol (TCP)

    Abbreviation of Transmission Control Protocol, and pronounced as separate letters. TCP is one of the main protocols in TCP/IP networks. Whereas the IP protocol deals only with packets, TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and also guarantees that packets will be delivered in […]

  • TCP/IP

    (pronounced as separate letters) Short for Transmission Control Protocol/Internet Protocol, TCP/IP is the suite of communications protocols used to connect hosts on the Internet. TCP/IP uses several protocols, the two main ones being TCP and IP. TCP/IP is built into the UNIX operating system and is used by the Internet, making it the de facto […]

  • TCP SYN attack

    A sender transmits a volume of connections that cannot be completed. This causes the connection queues to fill up, thereby denying service to legitimate TCP users. A TCP SYN attack (also called SYN attack) is a common type of Denial of Service attack.

  • TCP Wrapper

    A computer program that provides firewall services to UNIX users on a network by monitoring incoming packets to determine if the external device is authorized to have access. TCP Wrapper monitors and filters incoming requests for the SYSTAT, FINGER, FTP, TELNET, RLOGIN, RSH, EXEC, TFTP, TALK, and other network services.


Disclaimer: TCB definition / meaning should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional. All content on this website is for informational purposes only.