A Guide to Understanding Covert Channel Analysis of Trusted Systems

A Guide to Understanding Covert Channel Analysis of Trusted Systems
Author :
Publisher : DIANE Publishing
Total Pages : 130
Release :
ISBN-10 : 9780788105708
ISBN-13 : 0788105701
Rating : 4/5 (08 Downloads)

Synopsis A Guide to Understanding Covert Channel Analysis of Trusted Systems by : DIANE Publishing Company

Provides a set of good practices related to covert channel analysis of systems employed for processing classified and other sensitive information. Written to help vendors and evaluators understand covert channel analysis requirements. Contains suggestions and recommendations. Glossary. References. Illustrations

A Guide to Procurement of Trusted Systems

A Guide to Procurement of Trusted Systems
Author :
Publisher : DIANE Publishing
Total Pages : 163
Release :
ISBN-10 : 9780788110245
ISBN-13 : 0788110241
Rating : 4/5 (45 Downloads)

Synopsis A Guide to Procurement of Trusted Systems by : Joan Fowler

Designed for new or experienced automated information system developers, purchasers, or program managers who must identify and satisfy requirements associated with security-relevant acquisitions. Explains Contract Data Requirements Lists (CDRLs), and Data Item Description (DIDs), and their use in the acquisitions process. Charts and tables. References, glossary and acronyms.

Official (ISC)2 Guide to the SSCP CBK

Official (ISC)2 Guide to the SSCP CBK
Author :
Publisher : CRC Press
Total Pages : 610
Release :
ISBN-10 : 9780203331576
ISBN-13 : 0203331575
Rating : 4/5 (76 Downloads)

Synopsis Official (ISC)2 Guide to the SSCP CBK by : Diana-Lynn Contesti

The SSCP certification is the key to unlocking the upper ranks of security implementation at the world's most prestigious organizations. If you're serious about becoming a leading tactician at the front lines, the (ISC) Systems Security Certified Practitioner (SSCP) certification is an absolute necessity-demanded by cutting-edge companies worldwid

A Guide to Understanding Discretionary Access Control in Trusted Systems

A Guide to Understanding Discretionary Access Control in Trusted Systems
Author :
Publisher :
Total Pages : 40
Release :
ISBN-10 : UOM:39015028875709
ISBN-13 :
Rating : 4/5 (09 Downloads)

Synopsis A Guide to Understanding Discretionary Access Control in Trusted Systems by :

"One of the features of the Criteria that is required of a secure system is the enforcement of discretionary access control (DAC). DAC is a means of restricting access to objects based on the identity of subjects and/or groups to which they belong. The controls are discretionary in the sense that a user or process given discretionary access to information is capable of passing that information along to another subject. This guide discusses issues involved in designing, implementing and evaluating DAC mechanisms. Its primary purpose is to provide guidance to manufacturers on how to select and build effective DAC mechanisms."--DTIC