A Guide to Understanding Covert Channel Analysis of Trusted Systems

A Guide to Understanding Covert Channel Analysis of Trusted Systems

Author: DIANE Publishing Company

Publisher: DIANE Publishing

Published: 1994-03

Total Pages: 130

ISBN-13: 0788105701

DOWNLOAD EBOOK

Provides a set of good practices related to covert channel analysis of systems employed for processing classified and other sensitive information. Written to help vendors and evaluators understand covert channel analysis requirements. Contains suggestions and recommendations. Glossary. References. Illustrations


A Guide to Procurement of Trusted Systems

A Guide to Procurement of Trusted Systems

Author: Joan Fowler

Publisher: DIANE Publishing

Published: 1994-06

Total Pages: 163

ISBN-13: 0788110241

DOWNLOAD EBOOK

Designed for new or experienced automated information system developers, purchasers, or program managers who must identify and satisfy requirements associated with security-relevant acquisitions. Explains Contract Data Requirements Lists (CDRLs), and Data Item Description (DIDs), and their use in the acquisitions process. Charts and tables. References, glossary and acronyms.


Official (ISC)2 Guide to the SSCP CBK

Official (ISC)2 Guide to the SSCP CBK

Author: Diana-Lynn Contesti

Publisher: CRC Press

Published: 2007-04-27

Total Pages: 610

ISBN-13: 0203331575

DOWNLOAD EBOOK

The SSCP certification is the key to unlocking the upper ranks of security implementation at the world's most prestigious organizations. If you're serious about becoming a leading tactician at the front lines, the (ISC) Systems Security Certified Practitioner (SSCP) certification is an absolute necessity-demanded by cutting-edge companies worldwid


A Guide to Understanding Discretionary Access Control in Trusted Systems

A Guide to Understanding Discretionary Access Control in Trusted Systems

Author:

Publisher:

Published: 1987

Total Pages: 40

ISBN-13:

DOWNLOAD EBOOK

"One of the features of the Criteria that is required of a secure system is the enforcement of discretionary access control (DAC). DAC is a means of restricting access to objects based on the identity of subjects and/or groups to which they belong. The controls are discretionary in the sense that a user or process given discretionary access to information is capable of passing that information along to another subject. This guide discusses issues involved in designing, implementing and evaluating DAC mechanisms. Its primary purpose is to provide guidance to manufacturers on how to select and build effective DAC mechanisms."--DTIC