Fact-checked by Grok 2 weeks ago
References
-
[1]
[PDF] Trusted Computer System Evaluation Criteria ["Orange Book"]Oct 8, 1998 · The trusted computer system evaluation criteria will be used directly and indirectly in the certification process. Along with applicable policy ...
-
[2]
[PDF] Trusted Computer System Evaluation Criteria(TCSEC)The TCSEC defines 6 evaluation classes identified by the rating scale from lowest to highest: D, C1, C2, B1,. B2, B3, and A1. An evaluated computer product ...
-
[3]
[PDF] Trusted Computer System Evaluation Criteria Trusted Computer ...The development of trusted computer system evaluation criteria can be traced back to the need for secure computing environments during the Cold War era. As ...
-
[4]
[PDF] Computer Security Technology Planning Study (Volume I)Oct 8, 1998 · This report presents a research and devel opment plan to guide the work leading to the achievement of secure multilevel computer systems for the ...Missing: trusted | Show results with:trusted
- [5]
-
[6]
[PDF] The Birth and Death of the Orange Book - Bitsavers.orgThis article traces the origins of computer security research and the path that led from a focus on government-funded research and system development to a focus ...
-
[7]
None### Summary of Key Points from the Anderson Report on Computer Security Criteria for DoD
-
[8]
Security Requirements for Automated Information Systems (AISs ...Provides mandatory, minimum AIS security requirements. More stringent requirements may be necessary for selected systems based on an assessment of acceptable ...Missing: TCSEC | Show results with:TCSEC
-
[9]
DoD Rainbow Series - NIST Computer Security Resource CenterDec 26, 1985 · DoD 5200.28-STD "Orange Book", DoD Trusted Computer System Evaluation Criteria (December 26, 1985) · CSC-STD-002-85 "Green Book", DoD Password ...
-
[10]
[PDF] A review of U.S. and European security evaluation criteriaSeveral United States and European documents describing criteria for specifying and evaluating the trust of computer products and systems have been written.
-
[11]
[PDF] Trusted Computer System Evaluation CriteriaThe TCSEC was introduced in. 1983 as part of the DoD's efforts to standardize security evaluations. Its primary objectives include: - Defining clear criteria ...
-
[12]
[PDF] Looking Back at the Bell-La Padula ModelDec 7, 2005 · The Bell-La Padula security model produced conceptual tools for the analysis and design of secure computer sys- tems. Together with its sibling ...
-
[13]
[PDF] A Guide to Procurement of Trusted Systems - DTICProducts List for Trusted Computer Systems. Many trusted system requirements can be effectively met, using existing evaluated products from this source document ...<|control11|><|separator|>
-
[14]
NCSC-TG-002 [Bright Blue Book] Trusted Product EvaluationThe Trusted Product Evaluation Program focuses on the security evaluation of commercially produced and supported computer systems by evaluating the technical ...Missing: tactical | Show results with:tactical
-
[15]
Chapter: Criteria to Evaluate Computer and Network SecurityThe ITSEC effort represents a serious attempt to transcend some of the limitations in the TCSEC, including the criteria for integrity and availability. However, ...
-
[16]
[PDF] Proceedings of the 9th National Computer Security Conference ...Sep 15, 1986 · ... site visits had been completed, the assessment team convened at the ... NCSC-WA-001-85,. National Computer Security. Center, Fort George ...
-
[17]
[PDF] Trusted Product Evaluation Program ProceduresThe Rating Maintenance Program (RAMP) provides a mechanism for a vendor to maintain the TCSEC rating of a product throughout its life cycle. During RAMP ...
-
[18]
History - Common CriteriaOrange Book) developed by the United States Department of Defense and the Canadian CTCPEC derived from the TCSEC standard. By unifying security evaluation ...Missing: superseded CNSS
-
[19]
[PDF] National Information Assurance Partnership (NIAP) Common ...Mar 23, 2006 · Common Criteria Evaluation and Validation Scheme and the conclusions of the testing laboratory in the evaluation technical report are ...
-
[20]
[PDF] Trusted Product Evaluation Program: "End of an Era"Oct 8, 1998 · We are now moving to a program which accredits commercial laboratories to evaluate COTS products against the TCSEC or the Common Criteria (CC).
-
[21]
[PDF] Common Criteria(CC)The table below depicts the correspondence between the TCSEC and the CC. TCSEC. CC. D. ---. ---. EAL1. C1. EAL2. C2. EAL3. B1. EAL4. B2. EAL5. B3. EAL6. A1.
-
[22]
[PDF] Introduction and general model August 1999 Version 2.1 CCAug 1, 1999 · This version of the Common Criteria for Information Technology Security. Evaluation (CC 2.1) is a revision that aligns it with International ...Missing: withdrawn harmonized
-
[23]
[PDF] ITL Bulletin Common Criteria: Launching the International Standard ...Nov 1, 1998 · Version 1.0 of the CC was completed ... The EALs have been developed with the goal of preserving the concepts of assurance drawn from the source.Missing: withdrawn harmonized
-
[24]
[PDF] Trends in Government Endorsed Security Product EvaluationsCommon Criteria evaluations should occur more often as vendors choose to pursue a single, internationally recognized Common Criteria evalua- tion instead of ...
-
[25]
[PDF] ITL Bulletin An Overview of the Common Criteria Evaluation and ...Oct 1, 2000 · The Common Criteria Scheme enables consumers to obtain an impartial assessment of an IT product by an independent laboratory. This security.
-
[26]
[PDF] Information Technology Security Evaluation Criteria ( ITSEC ...Jun 28, 1991 · 1.36 The TCSEC defines seven sets of evaluation criteria called classes (D, C1, C2, B1, B2,. B3 and A1), grouped into four divisions (D, C, B ...
-
[27]
TRUSTED NETWORK INTERPRETATION ENVIRONMENTS ...NCSC-evaluation refers specifically to the process in which the NCSC determines ... NCSC evaluation is an evaluation against the TCSEC (and the TNI).Missing: visits | Show results with:visits
-
[28]
[PDF] Introduction and general model January 2004 Version 2.2 RJan 2, 2004 · Common Criteria approach ... All the members of a class share a common focus, while differing in coverage of security objectives.
-
[29]
[PDF] Trends in Government Endorsed Security Product EvaluationsIn the 1990s the number of OS evaluations leveled off at a rough average of 8 per year. During the same period, other types of products accounted for an av ...
-
[30]
A Guide to Understanding Trusted Recovery in Trusted SystemsThis document contains suggestions and recommendations derived from TCSEC objectives but which the TCSEC does not require. Examples in this document are not the ...Missing: LaPadula | Show results with:LaPadula
-
[31]
[PDF] DoDI 8510.01, "Risk Management Framework for DoD Systems ...Jul 19, 2022 · Establishes the cybersecurity Risk Management Framework (RMF) for DoD Systems (referred to in this issuance as “the RMF”) and establishes policy ...