Written in a friendly and easy-to-understand tone, Computer Security Assurance Using the Common Criteria helps readers navigate through all the activities within the Common Criteria (CC) that have gained the attention of the security community and will revolutionize how people compare, select, purchase, and maintain security systems. Practical examples aimed at deciphering the contents and activities within the CC help build an understanding that places readers on a path to real-world security assurance applications. Up-to-date coverage explains IT security assurance methodologies and the activities within any of the CC-defined user roles that are necessary for high quality and proven secure IT software and hardware.
Les mer
Gives a thorough understanding of computer-security engineering and practices. Helps navigate through all the activities within the Common Criteria (CC) that have gained the attention of the security community and will influence how people compare, select, purchase and maintain security systems.
Les mer
Part I BUILDING TRUST in SECURITY SYSTEMS: Foundations of IT Security Assurance.The Common Criteria (CC).Part II THE PIECES of the COMMON CRITERIA (CC) PUZZLE: Participants and Activities within the Common Criteria (CC).Developing a Protection Profile (PP). Developing Security Targets.The CCToolBox.Common Criteria (CC) Interpretations and Issue Resolution.Part III EVALUATION PHASE: Evaluating Target of Evaluations (TOEs).Certification Process.Maintenance of Assurance.The Common Criteria (CC) at Work.Part IV APPENDIXES: Appendix A Sample Protection Profile (PP).Appendix B Sample Security Target.Appendix C Example Common Criteria (CC) Certificate.Appendix D Common Criteria (CC)-Compliant Testing Labs.Appendix E Guidance Documents.Appendix F Inside The Common Criteria Information Portal.Appendix G Other Common Criteria (CC) Information Sources.Appendix H Glossary.
Les mer
Part I BUILDING TRUST IN SECURITY SYSTEMS: Foundations of IT Security Assurance. The Common Criteria (CC). Part II THE PIECES OF THE COMMON CRITERIA (CC) PUZZLE: Participants and Activities within the Common Criteria (CC). Developing a Protection Profile (PP). Developing Security Targets. The CCToolBox. Common Criteria (CC) Interpretations and Issue Resolution. Part III EVALUATION PHASE: Evaluating Target of Evaluations (TOEs). Certification Process. Maintenance of Assurance. The Common Criteria (CC) at Work. Part IV APPENDIXES: Appendix A Sample Protection Profile (PP). Appendix B Sample Security Target. Appendix C Example Common Criteria (CC) Certificate. Appendix D Common Criteria (CC)-Compliant Testing Labs. Appendix E Guidance Documents. Appendix F Inside The Common Criteria Information Portal. Appendix G Other Common Criteria (CC) Information Sources. Appendix H Glossary.
Les mer

Produktdetaljer

ISBN
9781401862657
Publisert
2004-06-01
Utgiver
Vendor
Delmar Cengage Learning
Vekt
499 gr
Høyde
228 mm
Bredde
188 mm
Dybde
17 mm
Aldersnivå
05, U
Språk
Product language
Engelsk
Format
Product format
Heftet
Antall sider
448

Biographical note

Mark S Merkow, CCP, CISSP, and CISM, works with his company?s CIO office to establish the IT security strategy for financial services management and infrastructure to support a broad portfolio of credit card, banking, and brokerage products and services. Mark represents his company as an FS/ISAC Site Coordinator. He is also a delegate to the ANSI X9F (Financial Services Security) committee and has worked closely with the National Institute of Standards and Technology (NIST) on the Common Criteria Security testing and evaluation methodology. Mark also teaches online courses in IT Security and E-commerce for DeVry University Online and University of Phoenix Online. He holds a Masters of Science in Decision and Information Systems and a Masters of Education in Learning Technologies from Arizona State University. Mark also holds two industry security certifications, the Certified Information Systems Security Professional (CISSP) and the Certified Information Security Manager (CISM) certificate from ISACA. Mark is also an author of seven books (five on IT Security), a columnist for Internet.com, and a contributor to several other books including the Internet Encyclopedia (Wiley, 2004). Jim Breithaupt is a project manager and IT specialist, involved with the rapidly emerging electronic brokerage and payment card technologies. Jim has more than twenty five years of experience as a systems analyst, designer, and developer, primarily in the financial services industry. Jim has also taught English for the past ten years as an adjunct faculty member in the Department of English for the Maricopa County Community College District. He is a contributing author to Building SET Applications for Secure Transactions (John Wiley & Sons, 1998) co-author of The Complete Guide To Internet Security (AMACOM Books, 2000), and co-author of The ePrivacy Imperative (AMACOM Books, 2001)