The Trusted Computer Security Evaluation Criteria (TBSEC) provides

A.
a basis for assessing the effectiveness of security controls built into automatic data-processing
system products
B.
a system analysis and penetration technique where specifications and document for the system
are analyzed.
C.
a formal static transition model of computer security policy that describes a set of access control
rules.
D.
a means of restricting access to objects based on the identity of subjects and groups to which they
belong.
Explanation:
TBSEC provides guidelines to be used with evaluating a security product. The TBSEC guidelines
address basic security functionality and allow evaluators to measure and rate the functionality of a
system and how trustworthy it is. Functionality and assurance are combined and not separated, as in
criteria developed later. TCSEC guidelines can be used for evaluating vendor products or by vendors
to design necessary functionality into new products. CISSP Study Guide by Tittel pg. 413.