{"id":560,"date":"2021-07-01T11:33:11","date_gmt":"2021-07-01T03:33:11","guid":{"rendered":"https:\/\/choson.lifenet.com.tw\/?p=560"},"modified":"2023-03-29T16:35:26","modified_gmt":"2023-03-29T08:35:26","slug":"%e5%8f%af%e4%bf%a1%e8%b7%af%e5%be%91%e5%92%8c%e5%8f%af%e4%bf%a1%e9%80%9a%e9%81%93trusted-path-and-trusted-channel","status":"publish","type":"post","link":"https:\/\/choson.lifenet.com.tw\/?p=560","title":{"rendered":"\u53ef\u4fe1\u8def\u5f91\u548c\u53ef\u4fe1\u901a\u9053(Trusted Path and Trusted Channel)"},"content":{"rendered":"\n<p><img decoding=\"async\" src=\"https:\/\/ithelp.ithome.com.tw\/upload\/images\/20210701\/20132160Jmzc6RhptU.jpg\" alt=\"https:\/\/ithelp.ithome.com.tw\/upload\/images\/20210701\/20132160Jmzc6RhptU.jpg\"><br>-\u53ef\u4fe1\u8def\u5f91\u548c\u53ef\u4fe1\u901a\u9053<br>.&nbsp;<a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/trusted_computer_system\" target=\"_blank\" rel=\"noreferrer noopener\">\u53ef\u4fe1\u8a08\u7b97\u6a5f\u7cfb\u7d71(Trusted Computer System)<\/a><br>\u5177\u6709\u5fc5\u8981\u7684\u5b89\u5168\u529f\u80fd\u4e26\u4fdd\u8b49\u5b89\u5168\u7b56\u7565\u5c07\u5f97\u5230\u57f7\u884c\u4e26\u4e14\u53ef\u4ee5\u540c\u6642\u8655\u7406\u4e00\u7cfb\u5217\u654f\u611f\u4fe1\u606f\uff08\u5373\u6a5f\u5bc6\u3001\u53d7\u63a7\u975e\u6a5f\u5bc6\u4fe1\u606f (CUI) \u6216\u975e\u6a5f\u5bc6\u516c\u5171\u4fe1\u606f\uff09\u7684\u7cfb\u7d71\u3002(CNSSI 4009-2015)<br>.&nbsp;<a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/trusted_computing_base\" target=\"_blank\" rel=\"noreferrer noopener\">\u53ef\u4fe1\u8a08\u7b97\u5eab (TCB)( Trusted Computing Base)<\/a><br>\u8a08\u7b97\u6a5f\u7cfb\u7d71\u5167\u4fdd\u8b77\u6a5f\u5236\u7684\u7e3d\u548c\uff0c\u5305\u62ec\u786c\u4ef6\u3001\u56fa\u4ef6\u548c\u8edf\u4ef6\uff0c\u8ca0\u8cac\u57f7\u884c\u5b89\u5168\u7b56\u7565\u7684\u7d44\u5408\u3002(CNSSI 4009-2015)<br>.&nbsp;<a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/security_kernel\" target=\"_blank\" rel=\"noreferrer noopener\">\u5b89\u5168\u5167\u6838(Security Kernel)<\/a><br>\u5be6\u73fe\u53c3\u8003\u76e3\u8996\u5668\u6982\u5ff5\u7684\u53ef\u4fe1\u8a08\u7b97\u57fa\u790e\u7684<a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/security_kernel\" target=\"_blank\" rel=\"noreferrer noopener\">\u5b89\u5168\u5167\u6838<\/a>\u786c\u4ef6\u3001\u56fa\u4ef6\u548c\u8edf\u4ef6\u5143\u7d20\u3002\u5b89\u5168\u5167\u6838\u5fc5\u9808\u8abf\u89e3\u6240\u6709\u8a2a\u554f\uff0c\u9632\u6b62\u4fee\u6539\uff0c\u4e26\u4e14\u53ef\u4ee5\u9a57\u8b49\u662f\u5426\u6b63\u78ba\u3002(CNSSI 4009-2015)<br>.&nbsp;<a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/trusted_path\" target=\"_blank\" rel=\"noreferrer noopener\">\u53ef\u4fe1\u8def\u5f91(Trusted Path)<\/a><br>\u4e00\u7a2e\u6a5f\u5236\uff0c\u7528\u6236\uff08\u901a\u904e\u8f38\u5165\u8a2d\u5099\uff09\u53ef\u4ee5\u901a\u904e\u9019\u7a2e\u6a5f\u5236\u76f4\u63a5\u8207\u4fe1\u606f\u7cfb\u7d71\u7684\u5b89\u5168\u529f\u80fd\u9032\u884c\u901a\u4fe1\uff0c\u4e26\u6709\u5fc5\u8981\u7684\u4fe1\u5fc3\u4f86\u652f\u6301\u7cfb\u7d71\u5b89\u5168\u7b56\u7565\u3002\u8a72\u6a5f\u5236\u53ea\u80fd\u7531\u7528\u6236\u6216\u4fe1\u606f\u7cfb\u7d71\u7684\u5b89\u5168\u529f\u80fd\u6fc0\u6d3b\uff0c\u4e0d\u53ef\u88ab\u4e0d\u53ef\u4fe1\u8edf\u4ef6\u6a21\u4eff\u3002(CNSSI 4009-2015)<br>.&nbsp;<a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/trusted_channel\" target=\"_blank\" rel=\"noreferrer noopener\">\u53ef\u4fe1\u901a\u9053(Trusted Channel)<\/a><br>\u7aef\u9ede\u5df2\u77e5\u4e14\u6578\u64da\u5b8c\u6574\u6027\u5728\u50b3\u8f38\u904e\u7a0b\u4e2d\u53d7\u5230\u4fdd\u8b77\u7684\u901a\u9053\u3002\u6839\u64da\u6240\u4f7f\u7528\u7684\u901a\u4fe1\u5354\u8b70\uff0c\u6578\u64da\u96b1\u79c1\u53ef\u80fd\u5728\u50b3\u8f38\u904e\u7a0b\u4e2d\u53d7\u5230\u4fdd\u8b77\u3002\u793a\u4f8b\u5305\u62ec\u50b3\u8f38\u5c64\u5b89\u5168 (TLS)\u3001IP \u5b89\u5168 (IPSec) \u548c\u5b89\u5168\u7269\u7406\u9023\u63a5\u3002(CNSSI 4009-2015)<br>.&nbsp;<a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/Trusted_Platform_Module\" target=\"_blank\" rel=\"noreferrer noopener\">\u53ef\u4fe1\u5e73\u53f0\u6a21\u584a (TPM)( Trusted Platform Module)<\/a><br>\u4e00\u7a2e\u5167\u7f6e\u65bc\u67d0\u4e9b\u8a08\u7b97\u6a5f\u4e3b\u677f\u4e2d\u7684\u9632\u7be1\u6539\u96c6\u6210\u96fb\u8def\uff0c\u53ef\u4ee5\u57f7\u884c\u52a0\u5bc6\u64cd\u4f5c\uff08\u5305\u62ec\u5bc6\u9470\u751f\u6210\uff09\u4e26\u4fdd\u8b77\u5c11\u91cf\u654f\u611f\u4fe1\u606f\uff0c\u4f8b\u5982\u5bc6\u78bc\u548c\u52a0\u5bc6\u5bc6\u9470\u3002(NIST SP 800-147)<br>.&nbsp;<a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/trusted_recovery\" target=\"_blank\" rel=\"noreferrer noopener\">\u53ef\u4fe1\u6062\u5fa9(Trusted Recovery)<\/a><br>\u78ba\u4fdd\u5728\u7cfb\u7d71\u6545\u969c\u5f8c\u4e0d\u53d7\u5f71\u97ff\u5730\u6062\u5fa9\u7684\u80fd\u529b\u3002(CNSSI 4009-2015) Common Criteria (CC) \u5b9a\u7fa9\u4e86\u56db\u7a2e\u985e\u578b\u7684<a href=\"https:\/\/wentzwu.com\/2020\/05\/14\/cissp-practice-questions-20200515\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u53ef\u4fe1\u6062\u5fa9<\/a>\uff1a\u624b\u52d5\u6062\u5fa9\u3001\u81ea\u52d5\u6062\u5fa9\u3001\u6c92\u6709\u904e\u5ea6\u4e1f\u5931\u7684\u81ea\u52d5\u6062\u5fa9\u548c\u529f\u80fd\u6062\u5fa9\u3002<\/p>\n\n\n\n<p>\u8cc7\u6599\u4f86\u6e90\uff1a<a rel=\"noreferrer noopener\" href=\"https:\/\/wentzwu.com\/2020\/05\/17\/trusted-path-and-trusted-channel\/\" target=\"_blank\">\u00a0Wentz Wu \u7db2\u7ad9<\/a><\/p>\n\n\n\n<p>PS:\u6b64\u6587\u7ae0\u7d93\u904e\u4f5c\u8005\u540c\u610f\u520a\u767b \u4e26\u4e14\u6388\u6b0a\u53ef\u4ee5\u7ffb\u8b6f\u6210\u4e2d\u6587<\/p>\n","protected":false},"excerpt":{"rendered":"<p>-\u53ef\u4fe1\u8def\u5f91\u548c\u53ef\u4fe1\u901a\u9053.&nbsp;\u53ef\u4fe1\u8a08\u7b97\u6a5f\u7cfb\u7d71(Trusted Computer System)\u5177\u6709\u5fc5\u8981\u7684\u5b89 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":true,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-560","post","type-post","status-publish","format-standard","hentry","category-cisspcertified-information-systems-security-professional"],"_links":{"self":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/560","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=560"}],"version-history":[{"count":2,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/560\/revisions"}],"predecessor-version":[{"id":2853,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/560\/revisions\/2853"}],"wp:attachment":[{"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=560"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=560"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/choson.lifenet.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=560"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}