Ver:
Mecanismo de seguridad que permite a un usuario
establecer una conexión segura con el sistema, evitando así cualquier intento
de suplantación de éste. Además, este mecanismo es imposible de imitar o
desactivar por un programa no fiable.
Para arrancar el mecanismo existe una secuencia de
teclas (p.e., en Windows NT: Ctrol + Alt + Del) que al ser pulsada elimina
todos los procesos actuales y comunica directamente con el sistema.
[Ribagorda:1997]
A mechanism by which a user
(through an input device) can communicate directly with the security functions
of the information system with the necessary confidence to support the system
security policy. This mechanism can only be activated by the user or the
security functions of the information system and cannot be imitated by
untrusted software. [CNSSI_4009:2010]
1a. (I) /COMPUSEC/ A
mechanism by which a computer system user can communicate directly and reliably
with the TCB and that can only be activated by the user or the TCB and cannot
be imitated by untrusted software within the computer. [NCS04]
1b. (I) /COMSEC/ A mechanism
by which a person or process can communicate directly with a cryptographic
module and that can only be activated by the person, process, or module, and
cannot be imitated by untrusted software within the module. [FP140] [RFC4949:2007]
A mechanism by which a user
(through an input device) can communicate directly with the security functions
of the information system with the necessary confidence to support the system security
policy. This mechanism can only be activated by the user or the security
functions of the information system and cannot be imitated by untrusted
software. [NIST-SP800-53:2013]
a means by which a user and
a TSF can communicate with necessary confidence.
TSF - TOE Security Functionality
TOE - Target of Evaluation
[CC:2006]
A mechanism by which a
person at a terminal can communicate directly with the Trusted Computing Base.
This mechanism can only be activated by the person or the Trusted Computing
Base and cannot be imitated by untrusted software. [TCSEC:1985]