Using the Common Criteria for IT Security Evaluation - download pdf or read online

By Debra S. Herrmann

Many corporations and govt companies require using universal standards qualified items and structures and use the typical standards technique of their acquisition approach. in reality, in July 2002 the U.S. nationwide info coverage Acquisition coverage (NSTISSP #11) mandated using CC evaluated IT defense items in severe infrastructure structures. This typical presents a finished technique for specifying, imposing, and comparing the protection of IT items, platforms, and networks. as the universal standards (CC) for IT safety review is a comparatively new overseas normal, little written fabric exists and is the reason this how-to wisdom, and it isn't precisely effortless to interpret.

Designed for use through buying agencies, procedure integrators, brands, and customary standards testing/certification labs, utilizing the typical standards for IT defense overview explains how and why to take advantage of the typical standards in the course of the acquisition, implementation or assessment of an IT product, process, community, or prone agreement. The textual content describes the typical standards technique; the most important strategies, steps, actions, recommendations, terminology, and the way the CC method is used through the lifetime of a process. It illustrates how each one classification of consumer should still hire the technique in addition to their diverse roles and tasks.

This textual content is a necessary source for all these inquisitive about severe infrastructure platforms, like these operated via the FAA, the Federal Reserve financial institution, DoD, NATO, NASA, and the intelligence businesses. prepared to stick to the typical standards lifecycle, utilizing the typical standards for IT defense assessment presents examples in each one bankruptcy to demonstrate how the method may be utilized in 3 diversified situations: a COTS product, a method or community, and a companies agreement. The dialogue difficulties on the finish of every bankruptcy make sure the text's effectiveness in an instructional atmosphere and make sure that these executive officers required to conform with Presidential selection Directive sixty three (PDD-63) may be capable of achieve this with confidence.

Show description

Read Online or Download Using the Common Criteria for IT Security Evaluation PDF

Best computer systems analysis & design books

Download PDF by Neil Fitzgerald,et al.: Crystal Reports XI Official Guide (Business Objects Press)

The approved advisor to the newest variation of the number one company intelligence software program product - Crystal stories. greater than sixteen million licenses of Crystal stories were shipped to date.  This booklet is a reference designed to supply hands-on counsel for the newest liberate of the product suite. the most recent model of Crystal stories and the enterprise gadgets firm reporting suite offers giant product improvements and a tighter integration that may force improvements from licensees.

Bill Buxton's Sketching User Experiences: Getting the Design Right and the PDF

Sketching person studies ways layout and layout pondering as whatever precise that should be higher understood—by either designers and the folks with whom they should paintings— that allows you to be successful with new items and structures. So whereas the point of interest is on layout, the technique is holistic.

Download e-book for kindle: Network Security by Scott C.-H. Huang,David MacCallum,Ding-Zhu Du

This publication presents a reference device for the expanding variety of scientists whose study is kind of occupied with community safety. assurance comprises community layout and modeling, community administration, facts administration, safety and applications.

Download e-book for iPad: Expert Cube Development with SSAS Multidimensional Models by Chris Webb,Alberto Ferrari,Marco Russo

Specialist counsel and methods for designing research prone Multidimensional ModelsAbout This BookDesign SQL Server research prone cubes, dimensions, and calculations from the specialists! upload calculations to the dice, together with imposing forex conversion and a date software dimensionUse defense to manage entry to information on your cubeWho This e-book Is ForIf you're an research providers dice fashion designer wishing to profit extra complex subject and top practices for dice layout, this publication is for you.

Extra info for Using the Common Criteria for IT Security Evaluation

Example text

Download PDF sample

Using the Common Criteria for IT Security Evaluation by Debra S. Herrmann


by Steven
4.5

Rated 4.74 of 5 – based on 24 votes