Document Type
|
:
|
BL
|
Record Number
|
:
|
953345
|
Doc. No
|
:
|
b707715
|
Main Entry
|
:
|
Herrmann, Debra S.
|
Title & Author
|
:
|
Using the common criteria for IT security evaluation /\ Debra S. Herrmann.
|
Publication Statement
|
:
|
Boca Raton, Fla. :: Auerbach Publications,, ©2003.
|
Page. NO
|
:
|
1 online resource (xvi, 288 pages)
|
ISBN
|
:
|
0203972805
|
|
:
|
: 0849314046
|
|
:
|
: 1420031422
|
|
:
|
: 9780203972809
|
|
:
|
: 9780849314049
|
|
:
|
: 9781420031423
|
Bibliographies/Indexes
|
:
|
Includes bibliographical references (pages 253-259) and index.
|
Contents
|
:
|
Introduction<BR>Background<BR>Purpose<BR>Scope<BR>Intended Audience<BR>Organization<BR>What Are the Common Criteria?<BR>History<BR>Purpose and Intended Use<BR>Major Components of the Methodology and How They Work<BR>Relationship to Other Standards<BR>CC User Community and Stakeholders<BR>Future of the CC<BR>Summary<BR>Discussion Problems<BR>Specifying Security Requirements: The Protection Profile<BR>Purpose<BR>Structure<BR>Introduction<BR>TOE Description<BR>TOE Security Environment<BR>Security Objectives<BR>Security Requirements<BR>PP Application Notes<BR>Rationale<BR>Summary<BR>Discussion Problems<BR>Designing a Security Architecture: The Security Target<BR>Purpose<BR>Structure<BR>Introduction<BR>TOE Description<BR>Security Environment<BR>Security Objectives<BR>Security Requirements<BR>TOE Summary Specification<BR>PP Claims<BR>Rationale<BR>Summary<BR>Discussion Problems<BR>Verifying a Security Solution: Security Assurance Activities<BR>Purpose<BR>ISO/IEC 15408-3<BR>Common Evaluation Methodology (CEM)<BR>National Evaluation Schemes<BR>Interpretation of Results<BR>Relation to Security Certification and Accreditation (C&A) Activities<BR>Summary<BR>Discussion Problems<BR>Postscript<BR>ASE-Security Target Evaluation<BR>AVA -- Vulnerability Analysis and Penetration Testing<BR>Services Contracts<BR>Schedules for New CC Standards (ISO/IEC and CCIMB)<BR>Annex A: Glossary of Acronyms and Terms<BR>Annex B: Additional Resources<BR>Standards, Regulations, and Policy (Historical and Current)<BR>Publications<BR>Online Resources<BR>Annex C: Common Criteria Recognition Agreement (CCRA) Participants<BR>Australia and New Zealand<BR>Defence Signals Directorate<BR>Canada<BR>Finland<BR>France<BR>Germany<BR>Greece<BR>Israel<BR>Italy<BR>The Netherlands<BR>Norway<BR>Spain<BR>Sweden<BR>United Kingdom<BR>United States<BR>Annex D: Accredited Common Criteria Evaluation Labs<BR>Australia and New Zealand<BR>Canada<BR>France<BR>Germany<BR>United Kingdom<BR><BR>United StatesAnnex E: Accredited Cryptographic Module Testing Laboratories<BR>Canada<BR>United States<BR>Annex F: Glossary of Classes and Families
|
Subject
|
:
|
Computer security-- Standards.
|
Subject
|
:
|
Information technology-- Standards.
|
Subject
|
:
|
Telecommunication-- Security measures-- Standards.
|
Subject
|
:
|
Computer security-- Standards.
|
Subject
|
:
|
COMPUTERS-- Internet-- Security.
|
Subject
|
:
|
COMPUTERS-- Networking-- Security.
|
Subject
|
:
|
COMPUTERS-- Security-- General.
|
Subject
|
:
|
Computersicherheit
|
Subject
|
:
|
Datensicherung
|
Subject
|
:
|
Evaluation
|
Subject
|
:
|
Information technology-- Standards.
|
Subject
|
:
|
Messung
|
Subject
|
:
|
Rechnernetz
|
Subject
|
:
|
Telekommunikationsnetz
|
Dewey Classification
|
:
|
005.8
|
LC Classification
|
:
|
TK5102.85.H47 2003eb
|
NLM classification
|
:
|
ST 276rvk
|