Using the common criteria for IT security evaluation
Many organizations and government agencies require the use of Common Criteria certified products and systems and use the Common Criteria methodology in their acquisition process. In fact, in July 2002 the U.S. National Information Assurance Acquisition Policy (NSTISSP #11) mandated the use of CC eva...
Main Author: | |
---|---|
Format: | eBook |
Language: | Inglés |
Published: |
Boca Raton, Fla. :
Auerbach Publications
c2003.
|
Edition: | 1st edition |
Subjects: | |
See on Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627190106719 |
Table of Contents:
- Front cover; Dedication; Other Books by the Author; Table of Contents; List of Exhibits; Chapter 1. Introduction; Chapter 2. What Are the Common Criteria?; Chapter 3. Specifying Security Requirements: The Protection Profile; Chapter 4. Designing a Security Architecture: The Security Target; Chapter 5. Verifying a Security Solution: Security Assurance Activities; Chapter 6. Postscript; Annex A: Glossary of Acronyms and Terms; Annex B: Additional Resources; Annex C: Common Criteria Recognition Agreement (CCRA) Participants; Annex D: Accredited Common Criteria Testing Labs
- Annex E: Accredited Cryptographic Module Testing LaboratoriesAnnex F: Glossary of Classes and Families; Index; Back cover