Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria

Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria PDF Author:
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 52

Get Book Here

Book Description
"This document provides interpretations of the Department of Defense Trusted Computer System Evaluation Criteria (DoD 52O0.28-STD or TCSEC) for computer security subsystems. A computer security subsystem (subsystem) is defined, herein, as hardware, firmware and/or software which can be added to a computer system to enhance the security of the overall system. A subsystem's primary utility is to increase the security of a computer system. The computer system that the subsystem is to protect is referred to as the protected system in this Interpretation. When incorporated into a system environment, evaluated computer security subsystems may be very effective in reducing or eliminating certain types of vulnerabilities whenever entire evaluated systems are unavailable or impractical."--DTIC.

Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria

Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria PDF Author:
Publisher:
ISBN:
Category : Computers
Languages : en
Pages : 52

Get Book Here

Book Description
"This document provides interpretations of the Department of Defense Trusted Computer System Evaluation Criteria (DoD 52O0.28-STD or TCSEC) for computer security subsystems. A computer security subsystem (subsystem) is defined, herein, as hardware, firmware and/or software which can be added to a computer system to enhance the security of the overall system. A subsystem's primary utility is to increase the security of a computer system. The computer system that the subsystem is to protect is referred to as the protected system in this Interpretation. When incorporated into a system environment, evaluated computer security subsystems may be very effective in reducing or eliminating certain types of vulnerabilities whenever entire evaluated systems are unavailable or impractical."--DTIC.

Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria

Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria PDF Author:
Publisher: DIANE Publishing
ISBN: 9781568064864
Category :
Languages : en
Pages : 46

Get Book Here

Book Description
Provides interpretation of the DoD Trusted Computer System Evaluation Criteria for computer security subsystems.

Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria

Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria PDF Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 44

Get Book Here

Book Description
This document provides interpretations of the Department of Defense Trusted Computer System Evaluation Criteria (DoD 52O0.28-STD or TCSEC) for computer security subsystems. A computer security subsystem (subsystem) is defined, herein, as hardware, firmware and/or software which can be added to a computer system to enhance the security of the overall system. A subsystem's primary utility is to increase the security of a computer system. The computer system that the subsystem is to protect is referred to as the protected system in this Interpretation. When incorporated into a system environment, evaluated computer security subsystems may be very effective in reducing or eliminating certain types of vulnerabilities whenever entire evaluated systems are unavailable or impractical.

Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria

Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria PDF Author: Michael W. Hale
Publisher: United States Government Printing
ISBN: 9780160015038
Category :
Languages : en
Pages : 43

Get Book Here

Book Description


Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria

Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria PDF Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 44

Get Book Here

Book Description
This document provides interpretations of the Department of Defense Trusted Computer System Evaluation Criteria (DoD 52O0.28-STD or TCSEC) for computer security subsystems. A computer security subsystem (subsystem) is defined, herein, as hardware, firmware and/or software which can be added to a computer system to enhance the security of the overall system. A subsystem's primary utility is to increase the security of a computer system. The computer system that the subsystem is to protect is referred to as the protected system in this Interpretation. When incorporated into a system environment, evaluated computer security subsystems may be very effective in reducing or eliminating certain types of vulnerabilities whenever entire evaluated systems are unavailable or impractical.

Trusted Product Evaluations

Trusted Product Evaluations PDF Author: DIANE Publishing Company
Publisher: DIANE Publishing
ISBN: 9780788115349
Category : Computers
Languages : en
Pages : 48

Get Book Here

Book Description


The 'Orange Book' Series

The 'Orange Book' Series PDF Author: US Department of Defense
Publisher: Springer
ISBN: 1349120200
Category : Computers
Languages : en
Pages : 1072

Get Book Here

Book Description
'...the most widely accepted set of criteria for computer security.' Financial Times The 'Orange Book' Series, produced by the American Department of Defense is as yet the only guide to effective computer security for both military and commercial sectors. These 17 documents provide a comprehensive set of guidelines both for people needing to introduce computer security measures and for companies developing secure computer systems and products. It contains details of the various security mechanisms that have been developed over time and the relevance of these to existing policies; how to test for an adequate implementation in a product and engineering techniques to be used as part of the assurance activities that form part of the product evaluation.

Computer Security Subsystem Interpretation

Computer Security Subsystem Interpretation PDF Author:
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 36

Get Book Here

Book Description


Computer Security Requirements

Computer Security Requirements PDF Author:
Publisher:
ISBN:
Category : Computer security
Languages : en
Pages : 24

Get Book Here

Book Description


Guide to Understanding Design Documentation in Trusted Systems

Guide to Understanding Design Documentation in Trusted Systems PDF Author:
Publisher: DIANE Publishing
ISBN: 9780788122309
Category :
Languages : en
Pages : 44

Get Book Here

Book Description
A set of good practices related to design documentation in automated data processing systems employed for processing classified and other sensitive information. Helps vendor and evaluator community understand what deliverables are required for design documentation and the level of detail required of design documentation at all classes in the Trusted Computer Systems Evaluation Criteria.