Trusted computer system: A system that is relied upon to enforce a specific security policy. It has been designed and configured to provide a certain level of assurance for maintaining the confidentiality, integrity, and availability of the information it processes
Categories: CC D5: Security Operations | CCSP D3: Cloud Platform and Infrastructure Security | CISM D3: Information Security Program | CISSP D3: Security Architecture and Engineering | Security+ D5: Security Program Management and Oversight | SSCP D1: Security Concepts and Practices
« Back to Glossary Index