Acceso fiable

Ver:

·         Confianza

Vía fiable

Mecanismo de seguridad que permite a un usuario establecer una conexión segura con el sistema, evitando así cualquier intento de suplantación de éste. Además, este mecanismo es imposible de imitar o desactivar por un programa no fiable.

Para arrancar el mecanismo existe una secuencia de teclas (p.e., en Windows NT: Ctrol + Alt + Del) que al ser pulsada elimina todos los procesos actuales y comunica directamente con el sistema. [Ribagorda:1997]

(en) trusted path

A mechanism by which a user (through an input device) can communicate directly with the security functions of the information system with the necessary confidence to support the system security policy. This mechanism can only be activated by the user or the security functions of the information system and cannot be imitated by untrusted software. [CNSSI_4009:2010]

(en) trusted path

1a. (I) /COMPUSEC/ A mechanism by which a computer system user can communicate directly and reliably with the TCB and that can only be activated by the user or the TCB and cannot be imitated by untrusted software within the computer. [NCS04]

1b. (I) /COMSEC/ A mechanism by which a person or process can communicate directly with a cryptographic module and that can only be activated by the person, process, or module, and cannot be imitated by untrusted software within the module. [FP140] [RFC4949:2007]

(en) Trusted Path

A mechanism by which a user (through an input device) can communicate directly with the security functions of the information system with the necessary confidence to support the system security policy. This mechanism can only be activated by the user or the security functions of the information system and cannot be imitated by untrusted software. [NIST-SP800-53:2013]

(en) trusted path

a means by which a user and a TSF can communicate with necessary confidence.

TSF - TOE Security Functionality

TOE - Target of Evaluation

[CC:2006]

(en) Trusted path

A mechanism by which a person at a terminal can communicate directly with the Trusted Computing Base. This mechanism can only be activated by the person or the Trusted Computing Base and cannot be imitated by untrusted software. [TCSEC:1985]

Temas relacionados

Términos