Herrmann | Using the Common Criteria for IT Security Evaluation | E-Book | www.sack.de
E-Book

E-Book, Englisch, 304 Seiten

Herrmann Using the Common Criteria for IT Security Evaluation


Erscheinungsjahr 2002
ISBN: 978-1-4200-3142-3
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

E-Book, Englisch, 304 Seiten

ISBN: 978-1-4200-3142-3
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



Many organizations and government agencies require the use of Common Criteria certified products and systems and use the Common Criteria methodology in their acquisition process. In fact, in July 2002 the U.S. National Information Assurance Acquisition Policy (NSTISSP #11) mandated the use of CC evaluated IT security products in critical infrastructure systems. This standard provides a comprehensive methodology for specifying, implementing, and evaluating the security of IT products, systems, and networks. Because the Common Criteria (CC) for IT Security Evaluation is a relatively new international standard, little written material exists which explains this how-to knowledge, and it's not exactly easy to interpret.

Designed to be used by acquiring organizations, system integrators, manufacturers, and Common Criteria testing/certification labs, Using the Common Criteria for IT Security Evaluation explains how and why to use the Common Criteria during the acquisition, implementation or evaluation of an IT product, system, network, or services contract. The text describes the Common Criteria methodology; the major processes, steps, activities, concepts, terminology, and how the CC methodology is used throughout the life of a system. It illustrates how each category of user should employ the methodology as well as their different roles and responsibilities.

This text is an essential resource for all those involved in critical infrastructure systems, like those operated by the FAA, the Federal Reserve Bank, DoD, NATO, NASA, and the intelligence agencies. Organized to follow the Common Criteria lifecycle, Using the Common Criteria for IT Security Evaluation provides examples in each chapter to illustrate how the methodology can be applied in three different scenarios: a COTS product, a system or network, and a services contract. The discussion problems at the end of each chapter ensure the text's effectiveness in an educational setting and ensure that those government officials required to comply with Presidential Decision Directive 63 (PDD-63) will be able to do so with confidence.

Herrmann Using the Common Criteria for IT Security Evaluation jetzt bestellen!

Zielgruppe


Program managers, product development managers, acquisition managers, security engineers, and system engineers responsible for the specification, design, development integration, test and evaluation, or acquisition of IT security products and systems


Autoren/Hrsg.


Weitere Infos & Material


Introduction
Background
Purpose
Scope
Intended Audience
Organization
What Are the Common Criteria?
History
Purpose and Intended Use
Major Components of the Methodology and How They Work
Relationship to Other Standards
CC User Community and Stakeholders
Future of the CC
Summary
Discussion Problems
Specifying Security Requirements: The Protection Profile
Purpose
Structure
Introduction
TOE Description
TOE Security Environment
Security Objectives
Security Requirements
PP Application Notes
Rationale
Summary
Discussion Problems
Designing a Security Architecture: The Security Target
Purpose
Structure
Introduction
TOE Description
Security Environment
Security Objectives
Security Requirements
TOE Summary Specification
PP Claims
Rationale
Summary
Discussion Problems
Verifying a Security Solution: Security Assurance Activities
Purpose
ISO/IEC 15408-3
Common Evaluation Methodology (CEM)
National Evaluation Schemes
Interpretation of Results
Relation to Security Certification and Accreditation (C&A) Activities
Summary
Discussion Problems
Postscript
ASE-Security Target Evaluation
AVA - Vulnerability Analysis and Penetration Testing
Services Contracts
Schedules for New CC Standards (ISO/IEC and CCIMB)
Annex A: Glossary of Acronyms and Terms
Annex B: Additional Resources
Standards, Regulations, and Policy (Historical and Current)
Publications
Online Resources
Annex C: Common Criteria Recognition Agreement (CCRA) Participants
Australia and New Zealand
Defence Signals Directorate
Canada
Finland
France
Germany
Greece
Israel
Italy
The Netherlands
Norway
Spain
Sweden
United Kingdom
United States
Annex D: Accredited Common Criteria Evaluation Labs
Australia and New Zealand
Canada
France
Germany
United Kingdom

United StatesAnnex E: Accredited Cryptographic Module Testing Laboratories
Canada
United States
Annex F: Glossary of Classes and Families



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.