2 cissp ® Official Study Guide Eighth Edition


Chapter 8  ■ Principles of Security Models, Design, and Capabilities Publication number



Download 19,3 Mb.
Pdf ko'rish
bet285/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   281   282   283   284   285   286   287   288   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

300
Chapter 8 

Principles of Security Models, Design, and Capabilities
Publication number
Title
Book name
NCSC-TG-002-85
PC Security Considerations
Light Blue Book
NCSC-TG-003
A Guide to Understanding Discretionary 
Access Controls in Trusted Systems
Neon Orange Book
NCSC-TG-004
Glossary of Computer Security Terms
Aqua Book
NCSC-TG-005
Trusted Network Interpretation
Red Book
NCSC-TG-006
A Guide to Understanding Configuration 
Management in Trusted Systems
Amber Book
NCSC-TG-007
A Guide to Understanding Design 
Documentation in Trusted Systems
Burgundy Book
NCSC-TG-008
A Guide to Understanding Trusted 
Distribution in Trusted Systems
Lavender Book
NCSC-TG-009
Computer Security Subsystem Interpretation 
of the TCSEC
Venice Blue Book
Given all the time and effort that went into formulating the TCSEC, it’s not unreason-
able to wonder why evaluation criteria have evolved to newer, more advanced standards. 
The relentless march of time and technology aside, these are the major critiques of TCSEC; 
they help to explain why newer standards are now in use worldwide:

Although the TCSEC puts considerable emphasis on controlling user access to infor-
mation, it doesn’t exercise control over what users do with information once access is 
granted. This can be a problem in military and commercial applications alike.

Given the origins of evaluation standards at the U.S. Department of Defense, it’s 
understandable that the TCSEC focuses its concerns entirely on confidentiality, which 
assumes that controlling how users access data is of primary importance and that con-
cerns about data accuracy or integrity are irrelevant. This doesn’t work in commercial 
environments where concerns about data accuracy and integrity can be more impor-
tant than concerns about confidentiality.

Outside the evaluation standards’ own emphasis on access controls, the TCSEC does 
not carefully address the kinds of personnel, physical, and procedural policy matters or 
safeguards that must be exercised to fully implement security policy. They don’t deal 
much with how such matters can impact system security either.

The Orange Book, per se, doesn’t deal with networking issues (though the Red Book, 
developed later in 1987, does).
Ta b l e 8 . 2
Some of the rainbow series elements 
(continued)


Select Controls Based On Systems Security Requirements 
301
To some extent, these criticisms refl ect the unique security concerns of the military, 
which developed the TCSEC. Then, too, the prevailing computing tools and technologies 
widely available at the time (networking was just getting started in 1985) had an impact as 
well. Certainly, an increasingly sophisticated and holistic view of security within organiza-
tions helps to explain why and where the TCSEC also fell short, procedurally and policy-
wise. But because ITSEC has been largely superseded by the Common Criteria, coverage 
in the next section explains ITSEC as a step along the way toward the Common Criteria 
(covered in the section after that).

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   281   282   283   284   285   286   287   288   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish