For example, we define a region to be secure. If a non secure app is trying to acess that region, what protection mechanism exists in hardware which will prevent that?
If you want a slightly longer answer here is a useful technical overview:
ARM Security Technology Building a Secure System using TrustZone Technology
HTH, Pete