The IT Law Wiki
 
(2 intermediate revisions by the same user not shown)
Line 1: Line 1:
  +
== Definition ==
The term '''trustworthy computing''' ('''TwC''') has been applied to [[computing system]]s that are inherently [[secure]], [[available]] and [[reliable]]. The Committee on Information Systems Trustworthiness’ publication, ''Trust in Cyberspace,'' defines such a system as one which
 
   
 
The term '''trustworthy computing''' ('''TwC''') has been applied to [[computing system]]s that are inherently [[secure]], [[available]] and [[reliable]].
:does what people expect it to do and not something else despite environmental disruption, human user and operator errors, and attacks by hostile parties. Design and implementation errors must be avoided, eliminated or somehow tolerated. It is not sufficient to address only some of these dimensions, nor is it sufficient simply to assemble components that are themselves trustworthy. Trustworthiness is holistic and multidimensional.
 
  +
  +
The Committee on Information Systems Trustworthiness' publication, ''Trust in Cyberspace,'' defines such a system as one which
  +
 
{{Quote|does what people expect it to do — and not something else — despite environmental disruption, human user and operator errors, and [[attack]]s by hostile parties. Design and [[implementation]] errors must be avoided, eliminated or somehow tolerated. It is not sufficient to address only some of these dimensions, nor is it sufficient simply to assemble [[component]]s that are themselves [[trustworthy]]. [[Trustworthiness]] is holistic and multidimensional.}}
   
   
Line 7: Line 11:
 
[[Category:Security]]
 
[[Category:Security]]
 
[[Category:Computing]]
 
[[Category:Computing]]
  +
[[Category:Definition]]

Latest revision as of 00:49, 28 July 2014

Definition[]

The term trustworthy computing (TwC) has been applied to computing systems that are inherently secure, available and reliable.

The Committee on Information Systems Trustworthiness' publication, Trust in Cyberspace, defines such a system as one which

does what people expect it to do — and not something else — despite environmental disruption, human user and operator errors, and attacks by hostile parties. Design and implementation errors must be avoided, eliminated or somehow tolerated. It is not sufficient to address only some of these dimensions, nor is it sufficient simply to assemble components that are themselves trustworthy. Trustworthiness is holistic and multidimensional.


This page uses Creative Commons Licensed content from Wikipedia (view authors). Smallwikipedialogo.png