Using the common criteria for IT security evaluation /
This book "explains how and why to use the 'common criteria' during the acquisition, implementation or evaluation of an IT product, system, network or services contract. The text describes the 'common criteria' methodology ; the major processes, steps, activities, concepts,...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Boca Raton, Fla. :
Auerbach Publications,
©2003.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Introduction<BR>Background<BR>Purpose<BR>Scope<BR>Intended Audience<BR>Organization<BR>What Are the Common Criteria?<BR>History<BR>Purpose and Intended Use<BR>Major Components of the Methodology and How They Work<BR>Relationship to Other Standards<BR>CC User Community and Stakeholders<BR>Future of the CC<BR>Summary<BR>Discussion Problems<BR>Specifying Security Requirements: The Protection Profile<BR>Purpose<BR>Structure<BR>Introduction<BR>TOE Description<BR>TOE Security Environment<BR>Security Objectives<BR>Security Requirements<BR>PP Application Notes<BR>Rationale<BR>Summary<BR>Discussion Problems<BR>Designing a Security Architecture: The Security Target<BR>Purpose<BR>Structure<BR>Introduction<BR>TOE Description<BR>Security Environment<BR>Security Objectives<BR>Security Requirements<BR>TOE Summary Specification<BR>PP Claims<BR>Rationale<BR>Summary<BR>Discussion Problems<BR>Verifying a Security Solution: Security Assurance Activities<BR>Purpose<BR>ISO/IEC 15408-3<BR>Common Evaluation Methodology (CEM)<BR>National Evaluation Schemes<BR>Interpretation of Results<BR>Relation to Security Certification and Accreditation (C & A) Activities<BR>Summary<BR>Discussion Problems<BR>Postscript<BR>ASE-Security Target Evaluation<BR>AVA
- Vulnerability Analysis and Penetration Testing<BR>Services Contracts<BR>Schedules for New CC Standards (ISO/IEC and CCIMB)<BR>Annex A: Glossary of Acronyms and Terms<BR>Annex B: Additional Resources<BR>Standards, Regulations, and Policy (Historical and Current)<BR>Publications<BR>Online Resources<BR>Annex C: Common Criteria Recognition Agreement (CCRA) Participants<BR>Australia and New Zealand<BR>Defence Signals Directorate<BR>Canada<BR>Finland<BR>France<BR>Germany<BR>Greece<BR>Israel<BR>Italy<BR>The Netherlands<BR>Norway<BR>Spain<BR>Sweden<BR>United Kingdom<BR>United States<BR>Annex D: Accredited Common Criteria Evaluation Labs<BR>Australia and New Zealand<BR>Canada<BR>France<BR>Germany<BR>United Kingdom<BR><BR>United StatesAnnex E: Accredited Cryptographic Module Testing Laboratories<BR>Canada<BR>United States<BR>Annex F: Glossary of Classes and Families