Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria

Computer Security Subsystem Interpretation of the Trusted Computer System Evaluation Criteria PDF

Author:

Publisher:

Published: 1988

Total Pages: 52

ISBN-13:

DOWNLOAD EBOOK →

"This document provides interpretations of the Department of Defense Trusted Computer System Evaluation Criteria (DoD 52O0.28-STD or TCSEC) for computer security subsystems. A computer security subsystem (subsystem) is defined, herein, as hardware, firmware and/or software which can be added to a computer system to enhance the security of the overall system. A subsystem's primary utility is to increase the security of a computer system. The computer system that the subsystem is to protect is referred to as the protected system in this Interpretation. When incorporated into a system environment, evaluated computer security subsystems may be very effective in reducing or eliminating certain types of vulnerabilities whenever entire evaluated systems are unavailable or impractical."--DTIC.

Trusted Database Management System Interpretation of the Trusted Computer System Evaluation Criteria

Trusted Database Management System Interpretation of the Trusted Computer System Evaluation Criteria PDF

Author:

Publisher: DIANE Publishing

Published: 1993-06

Total Pages: 160

ISBN-13: 9781568064871

DOWNLOAD EBOOK →

Provides a standard to manufacturers for security features to build into their new and planned commercial products in order to provide widely available systems that satisfy trust requirements for sensitive applications. Also discusses a means of evaluating the degree of trust that can be placed in computer systems for the secure processing of classified and other sensitive information. Diagram.

Computer Security Basics

Computer Security Basics PDF

Author: Deborah Russell

Publisher: "O'Reilly Media, Inc."

Published: 1991

Total Pages: 486

ISBN-13: 9780937175712

DOWNLOAD EBOOK →

Deborah Russell provides a broad introduction to the many areas of computer security and a detailed description of how the government sets standards and guidelines for security products. The book describes complicated concepts such as trusted systems, encryption and mandatory access control in simple terms, and includes an introduction to the "Orange Book".

Information Security Management

Information Security Management PDF

Author: Bel G. Raggad

Publisher: CRC Press

Published: 2010-01-29

Total Pages: 870

ISBN-13: 1439882630

DOWNLOAD EBOOK →

Information security cannot be effectively managed unless secure methods and standards are integrated into all phases of the information security life cycle. And, although the international community has been aggressively engaged in developing security standards for network and information security worldwide, there are few textbooks available that