Which of the following statements pertaining to the trusted computing base (TCB) is false?

A.
It addresses the level of security a system provides
B.
It originates from the Orange Book
C.
It includes hardware, firmware, and software
D.
A higher TCB rating will require that details of their testing procedures and documentation be
reviewed with more granularity
Explanation: