Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria

Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria

Author:

Publisher:

Published: 1988

Total Pages: 52

ISBN-13:

DOWNLOAD EBOOK

"This document provides interpretations of the Department of Defense Trusted Computer System Evaluation Criteria (DoD 52O0.28-STD or TCSEC) for computer security subsystems. A computer security subsystem (subsystem) is defined, herein, as hardware, firmware and/or software which can be added to a computer system to enhance the security of the overall system. A subsystem's primary utility is to increase the security of a computer system. The computer system that the subsystem is to protect is referred to as the protected system in this Interpretation. When incorporated into a system environment, evaluated computer security subsystems may be very effective in reducing or eliminating certain types of vulnerabilities whenever entire evaluated systems are unavailable or impractical."--DTIC.


Trusted Database Management System Interpretation of the Trusted Computer System Evaluation Criteria

Trusted Database Management System Interpretation of the Trusted Computer System Evaluation Criteria

Author:

Publisher: DIANE Publishing

Published: 1993-06

Total Pages: 160

ISBN-13: 9781568064871

DOWNLOAD EBOOK

Provides a standard to manufacturers for security features to build into their new and planned commercial products in order to provide widely available systems that satisfy trust requirements for sensitive applications. Also discusses a means of evaluating the degree of trust that can be placed in computer systems for the secure processing of classified and other sensitive information. Diagram.


National Computer Security Conference, 1993 (16th) Proceedings

National Computer Security Conference, 1993 (16th) Proceedings

Author: DIANE Publishing Company

Publisher: DIANE Publishing

Published: 1995-08

Total Pages: 568

ISBN-13: 9780788119248

DOWNLOAD EBOOK

Presentations of a conference. Covers a wide range of topics spanning the new draft Federal Criteria for Information Security, research and development activities, techniques for building secure computer systems and networks, and ethics issues. Papers and panels address harmonization of U.S. criteria for information technology security with international criteria, future techniques for integrating commercial off-the-shelf products into secure systems, access control and other networking challenges, etc. Numerous tables and figures.


Official (ISC)2® Guide to the CISSP®-ISSEP® CBK®

Official (ISC)2® Guide to the CISSP®-ISSEP® CBK®

Author: Susan Hansche

Publisher: CRC Press

Published: 2005-09-29

Total Pages: 814

ISBN-13: 142003135X

DOWNLOAD EBOOK

The Official (ISC)2® Guide to the CISSP®-ISSEP® CBK® provides an inclusive analysis of all of the topics covered on the newly created CISSP-ISSEP Common Body of Knowledge. The first fully comprehensive guide to the CISSP-ISSEP CBK, this book promotes understanding of the four ISSEP domains: Information Systems Security Engineering (ISSE); Certification and Accreditation; Technical Management; and an Introduction to United States Government Information Assurance Regulations. This volume explains ISSE by comparing it to a traditional Systems Engineering model, enabling you to see the correlation of how security fits into the design and development process for information systems. It also details key points of more than 50 U.S. government policies and procedures that need to be understood in order to understand the CBK and protect U.S. government information. About the Author Susan Hansche, CISSP-ISSEP is the training director for information assurance at Nortel PEC Solutions in Fairfax, Virginia. She has more than 15 years of experience in the field and since 1998 has served as the contractor program manager of the information assurance training program for the U.S. Department of State.


National Information Systems Security '95 (18th) Proceedings

National Information Systems Security '95 (18th) Proceedings

Author: DIANE Publishing Company

Publisher: DIANE Publishing

Published: 1996-07

Total Pages: 408

ISBN-13: 9780788128523

DOWNLOAD EBOOK

Held October 10-13, 1995. Addresses a wide range of interests from technical research and development projects to user oriented management and administration topics. Focuses on developing and implementing secure networks, technologies, applications, and policies. Papers and panel discussions address a broad spectrum of network security subjects including: security architecture, internet security, firewalls, multilevel security products and security management.