Trustworthy System

Computer hardware, software and procedures that:

1) Are reasonably secure from intrusion and misuse.

2) Provide a reasonable level of availability, reliability, and correct operation.

3) Are reasonably suited to performing their intended functions.

4) Adhere to generally accepted security procedures.


Trustworthy System

Computer hardware, software and procedures that:

1) Are reasonably secure from intrusion and misuse.

2) Provide a reasonable level of availability, reliability, and correct operation.

3) Are reasonably suited to performing their intended functions.

4) Adhere to generally accepted security procedures.

Used in methodology