Book description
Designed to be used by acquiring organizations, system integrators, manufacturers, and Common Criteria testing/certification labs, the Common Criteria (CC) for IT Security Evaluation is a relatively new international standard. This standard provides a comprehensive methodology for specifying, implementing, and evaluating the security of IT products, systems, and networks. This book explains in detail how and why the CC methodology was developed, describes the CC methodology and how it is used throughout the life of a system, and illustrates how each of the four categories of users should employ the methodology as well as their different roles and responsibilities.
Table of contents
- Front cover
- Dedication
- Other Books by the Author
- Table of Contents
- List of Exhibits
- Chapter 1. Introduction
- Chapter 2. What Are the Common Criteria? (1/11)
- Chapter 2. What Are the Common Criteria? (2/11)
- Chapter 2. What Are the Common Criteria? (3/11)
- Chapter 2. What Are the Common Criteria? (4/11)
- Chapter 2. What Are the Common Criteria? (5/11)
- Chapter 2. What Are the Common Criteria? (6/11)
- Chapter 2. What Are the Common Criteria? (7/11)
- Chapter 2. What Are the Common Criteria? (8/11)
- Chapter 2. What Are the Common Criteria? (9/11)
- Chapter 2. What Are the Common Criteria? (10/11)
- Chapter 2. What Are the Common Criteria? (11/11)
- Chapter 3. Specifying Security Requirements: The Protection Profile (1/14)
- Chapter 3. Specifying Security Requirements: The Protection Profile (2/14)
- Chapter 3. Specifying Security Requirements: The Protection Profile (3/14)
- Chapter 3. Specifying Security Requirements: The Protection Profile (4/14)
- Chapter 3. Specifying Security Requirements: The Protection Profile (5/14)
- Chapter 3. Specifying Security Requirements: The Protection Profile (6/14)
- Chapter 3. Specifying Security Requirements: The Protection Profile (7/14)
- Chapter 3. Specifying Security Requirements: The Protection Profile (8/14)
- Chapter 3. Specifying Security Requirements: The Protection Profile (9/14)
- Chapter 3. Specifying Security Requirements: The Protection Profile (10/14)
- Chapter 3. Specifying Security Requirements: The Protection Profile (11/14)
- Chapter 3. Specifying Security Requirements: The Protection Profile (12/14)
- Chapter 3. Specifying Security Requirements: The Protection Profile (13/14)
- Chapter 3. Specifying Security Requirements: The Protection Profile (14/14)
- Chapter 4. Designing a Security Architecture: The Security Target (1/10)
- Chapter 4. Designing a Security Architecture: The Security Target (2/10)
- Chapter 4. Designing a Security Architecture: The Security Target (3/10)
- Chapter 4. Designing a Security Architecture: The Security Target (4/10)
- Chapter 4. Designing a Security Architecture: The Security Target (5/10)
- Chapter 4. Designing a Security Architecture: The Security Target (6/10)
- Chapter 4. Designing a Security Architecture: The Security Target (7/10)
- Chapter 4. Designing a Security Architecture: The Security Target (8/10)
- Chapter 4. Designing a Security Architecture: The Security Target (9/10)
- Chapter 4. Designing a Security Architecture: The Security Target (10/10)
- Chapter 5. Verifying a Security Solution: Security Assurance Activities (1/12)
- Chapter 5. Verifying a Security Solution: Security Assurance Activities (2/12)
- Chapter 5. Verifying a Security Solution: Security Assurance Activities (3/12)
- Chapter 5. Verifying a Security Solution: Security Assurance Activities (4/12)
- Chapter 5. Verifying a Security Solution: Security Assurance Activities (5/12)
- Chapter 5. Verifying a Security Solution: Security Assurance Activities (6/12)
- Chapter 5. Verifying a Security Solution: Security Assurance Activities (7/12)
- Chapter 5. Verifying a Security Solution: Security Assurance Activities (8/12)
- Chapter 5. Verifying a Security Solution: Security Assurance Activities (9/12)
- Chapter 5. Verifying a Security Solution: Security Assurance Activities (10/12)
- Chapter 5. Verifying a Security Solution: Security Assurance Activities (11/12)
- Chapter 5. Verifying a Security Solution: Security Assurance Activities (12/12)
- Chapter 6. Postscript
- Annex A: Glossary of Acronyms and Terms (1/3)
- Annex A: Glossary of Acronyms and Terms (2/3)
- Annex A: Glossary of Acronyms and Terms (3/3)
- Annex B: Additional Resources (1/2)
- Annex B: Additional Resources (2/2)
- Annex C: Common Criteria Recognition Agreement (CCRA) Participants (1/2)
- Annex C: Common Criteria Recognition Agreement (CCRA) Participants (2/2)
- Annex D: Accredited Common Criteria Testing Labs (1/2)
- Annex D: Accredited Common Criteria Testing Labs (2/2)
- Annex E: Accredited Cryptographic Module Testing Laboratories
- Annex F: Glossary of Classes and Families
- Index (1/2)
- Index (2/2)
- Back cover
Product information
- Title: Using the Common Criteria for IT Security Evaluation
- Author(s):
- Release date: December 2002
- Publisher(s): Auerbach Publications
- ISBN: 9781420031423
You might also like
book
IT Certification Success Exam Cram™ 2
IT Certification Success Exam Cram 2 provides you with a detailed explanation of the certification arena …
book
Bring Your Own Devices (BYOD) Survival Guide
Where end-users once queued up to ask the IT department for permission to buy a new …
book
Operational Assessment of IT
This book presents ideas and concepts of optimization designed to improve an organization's business processes and …
book
VMware vRealize Operations Performance and Capacity Management
A hands-on guide to mastering performance and capacity management in a virtual data center In Detail …