Using the common criteria for IT security evaluation. (©2003)
- Record Type:
- Book
- Title:
- Using the common criteria for IT security evaluation. (©2003)
- Main Title:
- Using the common criteria for IT security evaluation
- Further Information:
- Note: Debra S. Herrmann.
- Other Names:
- Herrmann, Debra S
- Contents:
- Introduction; Background; Purpose; Scope; Intended Audience; Organization; What Are the Common Criteria?; History; Purpose and Intended Use; Major Components of the Methodology and How They Work; Relationship to Other Standards; CC User Community and Stakeholders; Future of the CC; Summary; Discussion Problems; Specifying Security Requirements: The Protection Profile; Purpose; Structure; Introduction; TOE Description; TOE Security Environment; Security Objectives; Security Requirements; PP Application Notes; Rationale; Summary; Discussion Problems; Designing a Security Architecture: The Security Target; Purpose; Structure; Introduction; TOE Description; Security Environment; Security Objectives; Security Requirements; TOE Summary Specification; PP Claims; Rationale; Summary; Discussion Problems; Verifying a Security Solution: Security Assurance Activities; Purpose; ISO/IEC 15408-3; Common Evaluation Methodology (CEM); National Evaluation Schemes; Interpretation of Results; Relation to Security Certification and Accreditation (C&A) Activities; Summary; Discussion Problems; Postscript; ASE-Security Target Evaluation; AVA - Vulnerability Analysis and Penetration Testing; Services Contracts; Schedules for New CC Standards (ISO/IEC and CCIMB); Annex A: Glossary of Acronyms and Terms; Annex B: Additional Resources; Standards, Regulations, and Policy (Historical and Current); Publications; Online Resources; Annex C: Common Criteria Recognition Agreement (CCRA) Participants;Introduction; Background; Purpose; Scope; Intended Audience; Organization; What Are the Common Criteria?; History; Purpose and Intended Use; Major Components of the Methodology and How They Work; Relationship to Other Standards; CC User Community and Stakeholders; Future of the CC; Summary; Discussion Problems; Specifying Security Requirements: The Protection Profile; Purpose; Structure; Introduction; TOE Description; TOE Security Environment; Security Objectives; Security Requirements; PP Application Notes; Rationale; Summary; Discussion Problems; Designing a Security Architecture: The Security Target; Purpose; Structure; Introduction; TOE Description; Security Environment; Security Objectives; Security Requirements; TOE Summary Specification; PP Claims; Rationale; Summary; Discussion Problems; Verifying a Security Solution: Security Assurance Activities; Purpose; ISO/IEC 15408-3; Common Evaluation Methodology (CEM); National Evaluation Schemes; Interpretation of Results; Relation to Security Certification and Accreditation (C&A) Activities; Summary; Discussion Problems; Postscript; ASE-Security Target Evaluation; AVA - Vulnerability Analysis and Penetration Testing; Services Contracts; Schedules for New CC Standards (ISO/IEC and CCIMB); Annex A: Glossary of Acronyms and Terms; Annex B: Additional Resources; Standards, Regulations, and Policy (Historical and Current); Publications; Online Resources; Annex C: Common Criteria Recognition Agreement (CCRA) Participants; Australia and New Zealand; Defence Signals Directorate; Canada; Finland; France; Germany; Greece; Israel; Italy; The Netherlands; Norway; Spain; Sweden; United Kingdom; United States; Annex D: Accredited Common Criteria Evaluation Labs; Australia and New Zealand; Canada; France; Germany; United Kingdom; ; United StatesAnnex E: Accredited Cryptographic Module Testing Laboratories; Canada; United States; Annex F: Glossary of Classes and Families … (more)
- Publisher Details:
- Boca Raton, Fla : Auerbach Publications
- Publication Date:
- 2003
- Copyright Date:
- 2003
- Extent:
- 1 online resource (xvi, 288 pages)
- Subjects:
- 005.8
Telecommunication -- Security measures -- Standards
Computer security -- Standards
Information technology -- Standards
COMPUTERS -- Internet -- Security
COMPUTERS -- Networking -- Security
COMPUTERS -- Security -- General
Datensicherung
Messung
Evaluation
Telekommunikationsnetz
Rechnernetz
Computersicherheit
Electronic books - Languages:
- English
- ISBNs:
- 0203972805
9780203972809
1420031422
9781420031423
0849314046
9780849314049 - Notes:
- Note: Includes bibliographical references (pages 253-259) and index.
Note: Print version record. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.160467
- Ingest File:
- 01_032.xml