Using the common criteria for IT security evaluation

Many organizations and government agencies require the use of Common Criteria certified products and systems and use the Common Criteria methodology in their acquisition process. In fact, in July 2002 the U.S. National Information Assurance Acquisition Policy (NSTISSP #11) mandated the use of CC eva...

Full description

Bibliographic Details
Main Author: Herrmann, Debra S. (-)
Format: eBook
Language:Inglés
Published: Boca Raton, Fla. : Auerbach Publications c2003.
Edition:1st edition
Subjects:
See on Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627190106719
Table of Contents:
  • Front cover; Dedication; Other Books by the Author; Table of Contents; List of Exhibits; Chapter 1. Introduction; Chapter 2. What Are the Common Criteria?; Chapter 3. Specifying Security Requirements: The Protection Profile; Chapter 4. Designing a Security Architecture: The Security Target; Chapter 5. Verifying a Security Solution: Security Assurance Activities; Chapter 6. Postscript; Annex A: Glossary of Acronyms and Terms; Annex B: Additional Resources; Annex C: Common Criteria Recognition Agreement (CCRA) Participants; Annex D: Accredited Common Criteria Testing Labs
  • Annex E: Accredited Cryptographic Module Testing LaboratoriesAnnex F: Glossary of Classes and Families; Index; Back cover