Author:
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 52
Book Description
"This document provides interpretations of the Department of Defense Trusted Computer System Evaluation Criteria (DoD 52O0.28-STD or TCSEC) for computer security subsystems. A computer security subsystem (subsystem) is defined, herein, as hardware, firmware and/or software which can be added to a computer system to enhance the security of the overall system. A subsystem's primary utility is to increase the security of a computer system. The computer system that the subsystem is to protect is referred to as the protected system in this Interpretation. When incorporated into a system environment, evaluated computer security subsystems may be very effective in reducing or eliminating certain types of vulnerabilities whenever entire evaluated systems are unavailable or impractical."--DTIC.
Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria
Author:
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 52
Book Description
"This document provides interpretations of the Department of Defense Trusted Computer System Evaluation Criteria (DoD 52O0.28-STD or TCSEC) for computer security subsystems. A computer security subsystem (subsystem) is defined, herein, as hardware, firmware and/or software which can be added to a computer system to enhance the security of the overall system. A subsystem's primary utility is to increase the security of a computer system. The computer system that the subsystem is to protect is referred to as the protected system in this Interpretation. When incorporated into a system environment, evaluated computer security subsystems may be very effective in reducing or eliminating certain types of vulnerabilities whenever entire evaluated systems are unavailable or impractical."--DTIC.
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 52
Book Description
"This document provides interpretations of the Department of Defense Trusted Computer System Evaluation Criteria (DoD 52O0.28-STD or TCSEC) for computer security subsystems. A computer security subsystem (subsystem) is defined, herein, as hardware, firmware and/or software which can be added to a computer system to enhance the security of the overall system. A subsystem's primary utility is to increase the security of a computer system. The computer system that the subsystem is to protect is referred to as the protected system in this Interpretation. When incorporated into a system environment, evaluated computer security subsystems may be very effective in reducing or eliminating certain types of vulnerabilities whenever entire evaluated systems are unavailable or impractical."--DTIC.
Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria
Author:
Publisher: DIANE Publishing
ISBN: 9781568064864
Category :
Languages : en
Pages : 46
Book Description
Provides interpretation of the DoD Trusted Computer System Evaluation Criteria for computer security subsystems.
Publisher: DIANE Publishing
ISBN: 9781568064864
Category :
Languages : en
Pages : 46
Book Description
Provides interpretation of the DoD Trusted Computer System Evaluation Criteria for computer security subsystems.
Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria
Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 44
Book Description
This document provides interpretations of the Department of Defense Trusted Computer System Evaluation Criteria (DoD 52O0.28-STD or TCSEC) for computer security subsystems. A computer security subsystem (subsystem) is defined, herein, as hardware, firmware and/or software which can be added to a computer system to enhance the security of the overall system. A subsystem's primary utility is to increase the security of a computer system. The computer system that the subsystem is to protect is referred to as the protected system in this Interpretation. When incorporated into a system environment, evaluated computer security subsystems may be very effective in reducing or eliminating certain types of vulnerabilities whenever entire evaluated systems are unavailable or impractical.
Publisher:
ISBN:
Category :
Languages : en
Pages : 44
Book Description
This document provides interpretations of the Department of Defense Trusted Computer System Evaluation Criteria (DoD 52O0.28-STD or TCSEC) for computer security subsystems. A computer security subsystem (subsystem) is defined, herein, as hardware, firmware and/or software which can be added to a computer system to enhance the security of the overall system. A subsystem's primary utility is to increase the security of a computer system. The computer system that the subsystem is to protect is referred to as the protected system in this Interpretation. When incorporated into a system environment, evaluated computer security subsystems may be very effective in reducing or eliminating certain types of vulnerabilities whenever entire evaluated systems are unavailable or impractical.
Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria
Author: Michael W. Hale
Publisher: United States Government Printing
ISBN: 9780160015038
Category :
Languages : en
Pages : 43
Book Description
Publisher: United States Government Printing
ISBN: 9780160015038
Category :
Languages : en
Pages : 43
Book Description
Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria
Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 44
Book Description
This document provides interpretations of the Department of Defense Trusted Computer System Evaluation Criteria (DoD 52O0.28-STD or TCSEC) for computer security subsystems. A computer security subsystem (subsystem) is defined, herein, as hardware, firmware and/or software which can be added to a computer system to enhance the security of the overall system. A subsystem's primary utility is to increase the security of a computer system. The computer system that the subsystem is to protect is referred to as the protected system in this Interpretation. When incorporated into a system environment, evaluated computer security subsystems may be very effective in reducing or eliminating certain types of vulnerabilities whenever entire evaluated systems are unavailable or impractical.
Publisher:
ISBN:
Category :
Languages : en
Pages : 44
Book Description
This document provides interpretations of the Department of Defense Trusted Computer System Evaluation Criteria (DoD 52O0.28-STD or TCSEC) for computer security subsystems. A computer security subsystem (subsystem) is defined, herein, as hardware, firmware and/or software which can be added to a computer system to enhance the security of the overall system. A subsystem's primary utility is to increase the security of a computer system. The computer system that the subsystem is to protect is referred to as the protected system in this Interpretation. When incorporated into a system environment, evaluated computer security subsystems may be very effective in reducing or eliminating certain types of vulnerabilities whenever entire evaluated systems are unavailable or impractical.
Trusted Product Evaluations
Author: DIANE Publishing Company
Publisher: DIANE Publishing
ISBN: 9780788115349
Category : Computers
Languages : en
Pages : 48
Book Description
Publisher: DIANE Publishing
ISBN: 9780788115349
Category : Computers
Languages : en
Pages : 48
Book Description
The 'Orange Book' Series
Author: US Department of Defense
Publisher: Springer
ISBN: 1349120200
Category : Computers
Languages : en
Pages : 1072
Book Description
'...the most widely accepted set of criteria for computer security.' Financial Times The 'Orange Book' Series, produced by the American Department of Defense is as yet the only guide to effective computer security for both military and commercial sectors. These 17 documents provide a comprehensive set of guidelines both for people needing to introduce computer security measures and for companies developing secure computer systems and products. It contains details of the various security mechanisms that have been developed over time and the relevance of these to existing policies; how to test for an adequate implementation in a product and engineering techniques to be used as part of the assurance activities that form part of the product evaluation.
Publisher: Springer
ISBN: 1349120200
Category : Computers
Languages : en
Pages : 1072
Book Description
'...the most widely accepted set of criteria for computer security.' Financial Times The 'Orange Book' Series, produced by the American Department of Defense is as yet the only guide to effective computer security for both military and commercial sectors. These 17 documents provide a comprehensive set of guidelines both for people needing to introduce computer security measures and for companies developing secure computer systems and products. It contains details of the various security mechanisms that have been developed over time and the relevance of these to existing policies; how to test for an adequate implementation in a product and engineering techniques to be used as part of the assurance activities that form part of the product evaluation.
Computer Security Subsystem Interpretation
Author:
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 36
Book Description
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 36
Book Description
Computer Security Requirements
Author:
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 24
Book Description
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 24
Book Description
Guide to Understanding Design Documentation in Trusted Systems
Author:
Publisher: DIANE Publishing
ISBN: 9780788122309
Category :
Languages : en
Pages : 44
Book Description
A set of good practices related to design documentation in automated data processing systems employed for processing classified and other sensitive information. Helps vendor and evaluator community understand what deliverables are required for design documentation and the level of detail required of design documentation at all classes in the Trusted Computer Systems Evaluation Criteria.
Publisher: DIANE Publishing
ISBN: 9780788122309
Category :
Languages : en
Pages : 44
Book Description
A set of good practices related to design documentation in automated data processing systems employed for processing classified and other sensitive information. Helps vendor and evaluator community understand what deliverables are required for design documentation and the level of detail required of design documentation at all classes in the Trusted Computer Systems Evaluation Criteria.