IT 244 Week 2 - DQ 1 - 7776

Solution Posted by
3number
Solution Detail
Price: $2.00
  • From: ,
  • Posted on: Fri 13 Apr, 2012
  • Request id: None
  • Purchased: 0 time(s)
  • Average Rating: No rating
Request Description

? Review Appendix B and select a company profile to be used for the final project. How might a trusted computing base (TCB) function in that company’s information system? Describe briefly the kind of hardware, software, and firmware that might be used within the TCB. How is the concept of a TCB illustrated by the ring of trust model?

 

 

A network that is protected with several features including software, hardware, and several other programs is called a Trusted Computing Base (TCB).  Here we have a company called the Bloom Design Group which most likely will profit from using the reference model to carry out business with personnel, clients, and designers in a safe manner.  By doing this, it allows for them to view only certain information and files.  The Bloom Design group will need software such as firewalls and other security programs that will help to protect the company. 

The TCB is distinct through a ring of trust that uses layers that allows users to gain access.  But this may vary depending on the level of information that is being accessed.  The further away from the center, the security is less likely to be in effect.  In the other hand, if the security is near the center, the more security one will have to go through In order to gain access to the information.

Solution Description

? Review Appendix B and select a company profile to be used for the final project. How might a trusted computing base (TCB) function in that company’s information system? Describe briefly the kind of hardware, software, and firmware that might be used