A method and apparatus for providing security for a computer system, which
includes generating a request for a file. The request is received at a
dedicated security processor, where the dedicated security processor may
access the file to validate the requested file. Upon determining that the
requested file is valid, the dedicated security processor may provide the
requested file to another processor.