Ver:
Mecanismo de seguridad que permite a un usuario establecer una conexión segura con el sistema, evitando así cualquier intento de suplantación de éste. Además, este mecanismo es imposible de imitar o desactivar por un programa no fiable.
Para arrancar el mecanismo existe una secuencia de teclas (p.e., en Windows NT: Ctrol + Alt + Del) que al ser pulsada elimina todos los procesos actuales y comunica directamente con el sistema. [Ribagorda:1997]
A mechanism by
which a user (through an input device) can communicate directly with the
security functions of the information system with the necessary confidence to
support the system security policy. This mechanism can only be activated by the
user or the security functions of the information system and cannot be imitated
by untrusted software. [CNSSI_4009:2010]
1a. (I)
/COMPUSEC/ A mechanism by which a computer system user can communicate directly
and reliably with the TCB and that can only be activated by the user or the TCB
and cannot be imitated by untrusted software within the computer. [NCS04]
1b. (I) /COMSEC/ A mechanism by which a person or process can communicate directly with a cryptographic module and that can only be activated by the person, process, or module, and cannot be imitated by untrusted software within the module. [FP140] [RFC4949:2007]
A mechanism by which a user (through an input device) can communicate directly with the security functions of the information system with the necessary confidence to support the system security policy. This mechanism can only be activated by the user or the security functions of the information system and cannot be imitated by untrusted software. [NIST-SP800-53:2013]
a means by which
a user and a TSF can communicate with necessary confidence.
TSF - TOE
Security Functionality
TOE - Target of
Evaluation
[CC:2006]
A mechanism by which a person at a terminal can communicate directly with the Trusted Computing Base. This mechanism can only be activated by the person or the Trusted Computing Base and cannot be imitated by untrusted software. [TCSEC:1985]
Temas relacionados