HOME > 상세정보

상세정보

Using the common criteria for IT security evaluation

Using the common criteria for IT security evaluation (8회 대출)

자료유형
단행본
개인저자
Herrmann, Debra S.
서명 / 저자사항
Using the common criteria for IT security evaluation / Debra S. Herrmann.
발행사항
Boca Raton, Fla. :   Auerbach Publications ,   c2003.  
형태사항
xvi, 288 p. ; 26 cm.
ISBN
0849314046 (alk. paper) 9780849314049
서지주기
Includes bibliographical references (p. 253-259) and index.
일반주제명
Telecommunication -- Security measures -- Standards. Telecommunication -- Security measures -- Evaluation. Computer security -- Standards. Information technology -- Standards.
000 01054camuu22003014a 4500
001 000045342229
005 20070417173328
008 020814s2003 flu b 001 0 eng
010 ▼a 2002033250
020 ▼a 0849314046 (alk. paper)
020 ▼a 9780849314049
035 ▼a (KERIS)REF000006782497
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
042 ▼a pcc
050 0 0 ▼a TK5102.85 ▼b .H47 2003
082 0 0 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b H568u
100 1 ▼a Herrmann, Debra S.
245 1 0 ▼a Using the common criteria for IT security evaluation / ▼c Debra S. Herrmann.
260 ▼a Boca Raton, Fla. : ▼b Auerbach Publications , ▼c c2003.
300 ▼a xvi, 288 p. ; ▼c 26 cm.
504 ▼a Includes bibliographical references (p. 253-259) and index.
650 0 ▼a Telecommunication ▼x Security measures ▼x Standards.
650 0 ▼a Telecommunication ▼x Security measures ▼x Evaluation.
650 0 ▼a Computer security ▼x Standards.
650 0 ▼a Information technology ▼x Standards.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 H568u 등록번호 121144847 (8회 대출) 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

Many organizations and government agencies require the use of Common Criteria certified products and systems and use the Common Criteria methodology in their acquisition process. In fact, in July 2002 the U.S. National Information Assurance Acquisition Policy (NSTISSP #11) mandated the use of CC evaluated IT security products in critical infrastructure systems. This standard provides a comprehensive methodology for specifying, implementing, and evaluating the security of IT products, systems, and networks. Because the Common Criteria (CC) for IT Security Evaluation is a relatively new international standard, little written material exists which explains this how-to knowledge, and it's not exactly easy to interpret.

Designed to be used by acquiring organizations, system integrators, manufacturers, and Common Criteria testing/certification labs, Using the Common Criteria for IT Security Evaluation explains how and why to use the Common Criteria during the acquisition, implementation or evaluation of an IT product, system, network, or services contract. The text describes the Common Criteria methodology; the major processes, steps, activities, concepts, terminology, and how the CC methodology is used throughout the life of a system. It illustrates how each category of user should employ the methodology as well as their different roles and responsibilities.

This text is an essential resource for all those involved in critical infrastructure systems, like those operated by the FAA, the Federal Reserve Bank, DoD, NATO, NASA, and the intelligence agencies. Organized to follow the Common Criteria lifecycle, Using the Common Criteria for IT Security Evaluation provides examples in each chapter to illustrate how the methodology can be applied in three different scenarios: a COTS product, a system or network, and a services contract. The discussion problems at the end of each chapter ensure the text's effectiveness in an educational setting and ensure that those government officials required to comply with Presidential Decision Directive 63 (PDD-63) will be able to do so with confidence.

Designed to be used by acquiring organizations, system integrators, manufacturers, and Common Criteria testing/certification labs, the Common Criteria (CC) for IT Security Evaluation is a relatively new international standard. This standard provides a comprehensive methodology for specifying, implementing, and evaluating the security of IT products, systems, and networks. This book explains in detail how and why the CC methodology was developed, describes the CC methodology and how it is used throughout the life of a system, and illustrates how each of the four categories of users should employ the methodology as well as their different roles and responsibilities.


정보제공 : Aladin

목차

IntroductionBackgroundPurposeScopeIntended AudienceOrganization What Are the Common Criteria?HistoryPurpose and Intended UseMajor Components of the Methodology and How They WorkRelationship to Other StandardsCC User Community and StakeholdersFuture of the CCSummaryDiscussion ProblemsSpecifying Security Requirements: The Protection ProfilePurposeStructureIntroductionTOE DescriptionTOE Security EnvironmentSecurity ObjectivesSecurity RequirementsPP Application NotesRationaleSummaryDiscussion ProblemsDesigning a Security Architecture: The Security TargetPurposeStructureIntroductionTOE DescriptionSecurity EnvironmentSecurity ObjectivesSecurity RequirementsTOE Summary SpecificationPP ClaimsRationaleSummaryDiscussion ProblemsVerifying a Security Solution: Security Assurance ActivitiesPurposeISO/IEC 15408-3Common Evaluation Methodology (CEM)National Evaluation SchemesInterpretation of ResultsRelation to Security Certification and Accreditation (C&A) ActivitiesSummaryDiscussion ProblemsPostscriptASE-Security Target EvaluationAVA - Vulnerability Analysis and Penetration TestingServices ContractsSchedules for New CC Standards (ISO/IEC and CCIMB)Annex A : Glossary of Acronyms and TermsAnnex B: Additional ResourcesStandards, Regulations, and Policy (Historical and Current)PublicationsOnline ResourcesAnnex C: Common Criteria Recognition Agreement (CCRA) ParticipantsAustralia and New ZealandDefence Signals DirectorateCanadaFinlandFranceGermanyGreeceIsraelItalyThe NetherlandsNorwaySpainSwedenUnited KingdomUnited StatesAnnex D: Accredited Common Criteria Evaluation LabsAustralia and New ZealandCanadaFranceGermanyUnited KingdomUnited StatesAnnex E: Accredited Cryptographic Module Testing LaboratoriesCanadaUnited StatesAnnex F: Glossary of Classes and Families


정보제공 : Aladin

관련분야 신착자료

Harvard Business Review (2025)