Using the Common Criteria for IT Security Evaluation

Book description

Designed to be used by acquiring organizations, system integrators, manufacturers, and Common Criteria testing/certification labs, the Common Criteria (CC) for IT Security Evaluation is a relatively new international standard. This standard provides a comprehensive methodology for specifying, implementing, and evaluating the security of IT products, systems, and networks. This book explains in detail how and why the CC methodology was developed, describes the CC methodology and how it is used throughout the life of a system, and illustrates how each of the four categories of users should employ the methodology as well as their different roles and responsibilities.

Table of contents

  1. Front cover
  2. Dedication
  3. Other Books by the Author
  4. Table of Contents
  5. List of Exhibits
  6. Chapter 1. Introduction
  7. Chapter 2. What Are the Common Criteria? (1/11)
  8. Chapter 2. What Are the Common Criteria? (2/11)
  9. Chapter 2. What Are the Common Criteria? (3/11)
  10. Chapter 2. What Are the Common Criteria? (4/11)
  11. Chapter 2. What Are the Common Criteria? (5/11)
  12. Chapter 2. What Are the Common Criteria? (6/11)
  13. Chapter 2. What Are the Common Criteria? (7/11)
  14. Chapter 2. What Are the Common Criteria? (8/11)
  15. Chapter 2. What Are the Common Criteria? (9/11)
  16. Chapter 2. What Are the Common Criteria? (10/11)
  17. Chapter 2. What Are the Common Criteria? (11/11)
  18. Chapter 3. Specifying Security Requirements: The Protection Profile (1/14)
  19. Chapter 3. Specifying Security Requirements: The Protection Profile (2/14)
  20. Chapter 3. Specifying Security Requirements: The Protection Profile (3/14)
  21. Chapter 3. Specifying Security Requirements: The Protection Profile (4/14)
  22. Chapter 3. Specifying Security Requirements: The Protection Profile (5/14)
  23. Chapter 3. Specifying Security Requirements: The Protection Profile (6/14)
  24. Chapter 3. Specifying Security Requirements: The Protection Profile (7/14)
  25. Chapter 3. Specifying Security Requirements: The Protection Profile (8/14)
  26. Chapter 3. Specifying Security Requirements: The Protection Profile (9/14)
  27. Chapter 3. Specifying Security Requirements: The Protection Profile (10/14)
  28. Chapter 3. Specifying Security Requirements: The Protection Profile (11/14)
  29. Chapter 3. Specifying Security Requirements: The Protection Profile (12/14)
  30. Chapter 3. Specifying Security Requirements: The Protection Profile (13/14)
  31. Chapter 3. Specifying Security Requirements: The Protection Profile (14/14)
  32. Chapter 4. Designing a Security Architecture: The Security Target (1/10)
  33. Chapter 4. Designing a Security Architecture: The Security Target (2/10)
  34. Chapter 4. Designing a Security Architecture: The Security Target (3/10)
  35. Chapter 4. Designing a Security Architecture: The Security Target (4/10)
  36. Chapter 4. Designing a Security Architecture: The Security Target (5/10)
  37. Chapter 4. Designing a Security Architecture: The Security Target (6/10)
  38. Chapter 4. Designing a Security Architecture: The Security Target (7/10)
  39. Chapter 4. Designing a Security Architecture: The Security Target (8/10)
  40. Chapter 4. Designing a Security Architecture: The Security Target (9/10)
  41. Chapter 4. Designing a Security Architecture: The Security Target (10/10)
  42. Chapter 5. Verifying a Security Solution: Security Assurance Activities (1/12)
  43. Chapter 5. Verifying a Security Solution: Security Assurance Activities (2/12)
  44. Chapter 5. Verifying a Security Solution: Security Assurance Activities (3/12)
  45. Chapter 5. Verifying a Security Solution: Security Assurance Activities (4/12)
  46. Chapter 5. Verifying a Security Solution: Security Assurance Activities (5/12)
  47. Chapter 5. Verifying a Security Solution: Security Assurance Activities (6/12)
  48. Chapter 5. Verifying a Security Solution: Security Assurance Activities (7/12)
  49. Chapter 5. Verifying a Security Solution: Security Assurance Activities (8/12)
  50. Chapter 5. Verifying a Security Solution: Security Assurance Activities (9/12)
  51. Chapter 5. Verifying a Security Solution: Security Assurance Activities (10/12)
  52. Chapter 5. Verifying a Security Solution: Security Assurance Activities (11/12)
  53. Chapter 5. Verifying a Security Solution: Security Assurance Activities (12/12)
  54. Chapter 6. Postscript
  55. Annex A: Glossary of Acronyms and Terms (1/3)
  56. Annex A: Glossary of Acronyms and Terms (2/3)
  57. Annex A: Glossary of Acronyms and Terms (3/3)
  58. Annex B: Additional Resources (1/2)
  59. Annex B: Additional Resources (2/2)
  60. Annex C: Common Criteria Recognition Agreement (CCRA) Participants (1/2)
  61. Annex C: Common Criteria Recognition Agreement (CCRA) Participants (2/2)
  62. Annex D: Accredited Common Criteria Testing Labs (1/2)
  63. Annex D: Accredited Common Criteria Testing Labs (2/2)
  64. Annex E: Accredited Cryptographic Module Testing Laboratories
  65. Annex F: Glossary of Classes and Families
  66. Index (1/2)
  67. Index (2/2)
  68. Back cover

Product information

  • Title: Using the Common Criteria for IT Security Evaluation
  • Author(s): Debra S. Herrmann
  • Release date: December 2002
  • Publisher(s): Auerbach Publications
  • ISBN: 9781420031423