Computer Security Requirements: Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments
DOD Computer Security Center, 1985 - Computer security - 13 pages
What people are saying - Write a review
We haven't found any reviews in the usual places.
Application developers including authorization of system authorized access Categories Containing Secret classified data clearance or authorization Closed security environment compartmented information Computer Security Center computer security requirements Computer System Evaluation Configuration control Containing Secret Data DAMI-CIC Dedicated security mode Defense Trusted Computer Department of Defense developers including maintainers document DoD Computer Security encompass those systems firmware formerly DoDCSC given risk index identifying the minimum introduced malicious logic introduction of malicious malicious logic prior MAXIMUM DATA SENSITIVITY maximum sensitivity minimum class minimum clearance MINIMUM CRITERIA CLASS MINIMUM USER CLEARANCE mission sensitive data mode of operation mode The mode Multilevel security mode NAVDAC number of categories processed and/or stored RATING SCALE Risk index computation SCALE FOR MAXIMUM Secret data causes Security Center DoDCSC sensitive or classified sensitivity level sufficient clearance System Evaluation Criteria System High system is required system users Top Secret Data Top Secret/Current Trusted Computer System types of compartmented unclassified