Russian IT Security Certification Scheme: Steps Toward Common Criteria Approach
|
|
|
- George Barber
- 10 years ago
- Views:
Transcription
1 6 15th International Common Criteria Conference, New Delhi, India Russian IT Security Certification Scheme: Steps Toward Common Criteria Approach Alexander Barabanov 1, Alexey Markov 1, Valentin Tsirlov 1 1 NPO Echelon, CJSC, Moscow, Russia {a.markov,a.barabanov}@npo-echelon.ru Abstract. This paper is dedicated to the Russian IT Security Certification Scheme; it shortly describes history, structure and features of the Scheme, provides statistics of certification tests administered and information about certification scheme evolution in view of the Common Criteria approach used in the Russian Scheme. Keywords: Certification, Russian IT Security Certification Scheme, IT security facility, Common Criteria. 1 Introduction Russian IT Security Certification Scheme was established in The Scheme offers evaluation and certification services to sponsors, developers and vendors. Key participants of the Scheme are: Sponsors (developers, vendors) which requests and funds an evaluation and a certification; Accredited Testing Labs (Commercial Evaluation Facilities) which carry out the evaluations, and the establishment of approved techniques and procedures; Certification Bodies which certify the results of evaluations of IT products; Federal Certification Body (FSTEC of Russia) which monitors all evaluations conducted under the Scheme. Relationships between major participants in the process are shown in Fig 1. Fig. 1. The chart of relationships between participants in the Scheme
2 Russian IT Security Certification Scheme: Steps Toward Common Criteria Approach 7 To date the certification system accredited: 40 Accredited Test Labs and 9 Certification Bodies. It should be noted that certification bodies may include both commercial and governmental agencies. Kinetic profile of test laboratories and certification bodies is shown in Fig. 2 and Fig. 3 respectively. Fig. 2. Increasing number of accredited test laboratories Fig. 3. Increasing number of accredited certification bodies Current approaches to evaluation may be generally classified as follows [1]: structural testing: source code analyses (static and dynamic analyses) in order to reveal software errors, non-declared opportunities and software bugs and flaws; functional testing is a test conducted to determine if the requirements of a specification are met (black or grey box testing). Aside from that, we would like to emphasize available procedure for inspection of certified products manufacture. Basic «classic» regulations used in the Scheme include: the mandatory document of 1992 which sets out requirements to Target of Evaluation (TOE) against unauthorized access to information (identification/authentication, access control etc.); this document is based on the Orange Book approach; the mandatory document of 1997 which lays down requirements to firewall; the mandatory document of 1999 which sets out requirements to search for undeclared opportunities (static, dynamic source code analysis).
3 8 15th International Common Criteria Conference, New Delhi, India If an TOE to be certified is neither a firewall nor an access control system it is certified for compliance with specifications originated by the test object developer. Recognizing necessity to reform the certification system so as to ensure repeatability and reproducibility of test results, enhance confidence in certificates, FSTEC of Russia adopted the Common Criteria approach to be the basis for origination of new generation documents. 2 The New FSTEC of Russia Approach The first attempted to use Common Criteria [5] approach was made by FSTEC of Russia in 2002 and included by origination and approval of mandatory documents of FSTEC of Russia which comprise authentic translation of 3 parts of Common Criteria and Common Methodology for Information Technology Security Evaluation. The work also included steps targeted at harmony between the Russian and European regulations, in particular, origination of state standards which comprise authentic translation of the European standards ISO/IEC 15408, ISO/IEC and ISO/IEC TR (Fig. 4). Fig. 4. Correspondence between international standards and Russian GOST Since 2012 the FSTEC of Russia has been insistently introducing TOE certification according to the Common Criteria procedure. Each type of TOE` has a document (regulations) which contains requirements to information security and sets up security categories with minimum requirements. For each type of TOE and category the FSTEC of Russia creates and approves Protection Profiles (Fig. 5). In the FSTEC of Russia originated requirements to intrusion detection systems and antivirus [1, 2].
4 Russian IT Security Certification Scheme: Steps Toward Common Criteria Approach 9 Fig. 5. Establishing of information security requirements in accordance with new approach of FSTEC of Russia 3 Russian IT Security Certification Scheme: some statistics Below we provide statistics of Russian IT Security Certification Scheme obtained after processing the information accessible in the official site of FSTEC of Russia [3] and the results of comparative analysis of the certification system of FSTEC of Russia and Common Criteria certification system [4]. Fig. 6 shows the number of certifications made in the certification system of FSTEC of Russia and certifications made under Common Criteria Certification Scheme. Fig. 6. Number of certifications (year-by-year) Fig. 7 shows shares of certifications made under Russian IT Security Certification Scheme) and types of TOE: firewal is the undisputed leader.
5 10 15th International Common Criteria Conference, New Delhi, India Fig. 7. Shares of certified TOE types (in , Russian IT Security Certification Scheme) Shares of certifications according to TOE type and year are given in Fig. 8. Fig. 8. Shares of certifications according to TOE type and year (in , Russian IT Security Certification Scheme) Similar analysis of the Common Criteria certification Scheme has shown (Fig. 9) that the following type of TOE are first three by the number of certifications: software used in smart cards; multi-functional devices (printers); software used in computer networks (routers, switches).
6 Russian IT Security Certification Scheme: Steps Toward Common Criteria Approach 11 Fig. 9. Shares of certified TOE types (in , Common Criteria Certification Scheme) Shares of certifications using «series» and «batch» patterns are given in Fig. 10. Fig. 10. Shares of certification patterns (in , Russian IT Security Certification Scheme) Shares of certifications of Russian-made and foreign-made TOE is shown in Fig. 11.
7 12 15th International Common Criteria Conference, New Delhi, India Fig. 11. Certifications of Russian-made and foreign-made TOE (in , Russian IT Security Certification Scheme)) Fig. 12 and 13 show foreign and Russian software developers most frequently certified under Russian IT Security Certification Scheme. Fig. 12. Foreign software developers certified by FSTEC of Russia (in ) Fig. 13. Russian software developers certified by FSTEC of Russia (in ) Similar analysis for Common Criteria certification schemes is shown in Fig. 14.
8 Russian IT Security Certification Scheme: Steps Toward Common Criteria Approach 13 Fig. 14. Software developers certified under Common Criteria Certification Schemes (in ) Shares of certifications with and without access to source code for certifications under Common Criteria Certification Schemes and Russian IT Security Certification Scheme are shown in Fig 15. Fig. 15. Shares of certifications according to access to source code (in ) Shares of certifications according to Common Criteria approach in the Russian Scheme given in Fig. 16.
9 14 15th International Common Criteria Conference, New Delhi, India Fig. 16. Shares of certifications according to Common Criteria approach in Russian Scheme Shares of certifications according to the evaluation assurance level (EAL) are shown in Fig. 17. Fig. 17. Shares of certifications according to EAL (Russian IT Security Certification Scheme) After the regulations setting information security requirements in compliance with Common Criteria have entered into force, both national and foreign developers used to certify their products according to new requirements. Foreign companies McAfee and Trend Micro appeared to be the first to get products certified. Safety Code LLC and Kaspersky Laboratory CJSC were among domestic developers which received the certificates of conformity from FSTEC of Russia. Labor consumption in certification tests according to the new requirements need to be discussed individually. The analysis carried out by experts from the test laboratory of Echelon NPO CJSC makes it possible to conclude that predetermined labor consumption of the tests has not much changed as compared to the traditional approach. Fig. 18 shows distribution of resources available in a test laboratory for certification in compliance with new regulations (based on the analysis of performance of Echelon NPO CJSC accredited test laboratory).
10 Russian IT Security Certification Scheme: Steps Toward Common Criteria Approach 15 Fig. 18. Distribution of cost incurred by the test laboratory for certification in compliance with new regulations from FSTEC of Russia 4 Conclusions Based on processed information from the official site of the FSTEC of Russia, one may reach the following conclusions concerning to Russian IT Security Certification Scheme. 1. First certifications according to the new requirements involved foreign-made TOE. The fact is the documents needed for certification in compliance with new requirements have been originated for certification in accordance with Common Criteria Certification Schemes. 2. The "batch" certification shall be gradually substituted by the "series" pattern since new regulations require applicants to maintain certified software at all stages of the life cycle. 3. More and more leading foreign developers provide the Russian test laboratories with an access to their source code, and this tendency shall be observed in future. 4. Introduction of new regulations shall enhance efficiency in detection of vulnerabilities in software submitted for certification. In the new documents the vulnerability assessment procedure is obligatory during certification with regard to all classes of security. In certification based on the traditional ruling documents the search for vulnerabilities is not an obligatory procedure and such search has been performed only by zealots for certification. For instance, the test laboratory in NPO Echelon revealed vulnerabilities in 50% (both the Russian-made and foreign-made) submitted for certification according to the new regulations. It should be noted that all vulnerabilities detected by NPO Echelon have been eliminated by developers. 5. The Russian developers shall pay more for certification. Even during certification for most popular Protection Class (Class 4) which has nothing to do with security of information comprising a state secret, EAL 3 is to be reached. The challenge is related to developer's evidences required which are relatively new (correlation with GOST is nearly absent) and procedures originated by FSTEC of Russia for developers are not available. 6. Costs of test laboratories for test procedures shall grow. The number of actively working laboratories will reduce since lack of procedures will make most of laboratories incapable of performing tests to satisfy new requirements.
11 16 15th International Common Criteria Conference, New Delhi, India Possibly, test laboratories will be accredited by the highest security class (EAL) for which the laboratory may perform tests. References 1. A.V. Barabanov, A.S. Markov, V.L. Tsirlov Certification of intrusion detection systems // Open systems. DBMS С A.S. Markov, V.L. Tsirlov, A.V. Barabanov Methods for assessment of non-conformity of information security facilities / Edited by A.S. Markov - M.: Radio & Communication, p. 3. Official site of the FSTEC of Russia: 4. Common Criteria portal: 5. Wes J. Lloyd, «A Common Criteria Based Approach for COTS Component Selection», Special issue: 6th GPCE Young Researchers Workshop About the authors Alexander Barabanov - CISSP, CSSLP, Head of Certification and Testing Department in NPO Echelon. Alexey Markov Ph.D, CISSP, CEO and Founder of NPO Echelon. Valentin Tsirlov Ph.D, CISSP, CISM, AMBCI, Executive Director and Co- Founder of NPO Echelon. NPO Echelon, CJSC is a Moscow-based leading Russian IT security Testing Laboratory. Established in 2007, NPO Echelon has for the last 5 years become a leading, reliable partner for software and hardware developers. Among our customers are SAP AG, IBM, Microsoft, Eset, McAfee, Symantec, Huawei, etc.
Secure software development in the Russian IT Security Certification Scheme. Alexander Barabanov, Alexey Markov, Valentin Tsirlov
Secure software development in the Russian IT Security Certification Scheme Alexander Barabanov, Alexey Markov, Valentin Tsirlov Agenda Brief overview Current status of the Russian IT Security Certification
IT Security Evaluation in China
IT Security Evaluation in China Yi Mao, Ph.D., CISSP atsec information security cooperation Austin, TX USA www.atsec.com [email protected] ICCC 2012 September 18-20, Paris, France atsec information security,
Common Criteria. Introduction 2014-02-24. Magnus Ahlbin. Emilie Barse 2014-02-25. Emilie Barse Magnus Ahlbin
Common Criteria Introduction 2014-02-24 Emilie Barse Magnus Ahlbin 1 Magnus Ahlbin Head of EC/ITSEF Information and Security Combitech AB SE-351 80 Växjö Sweden [email protected] www.combitech.se
Certification Report
Certification Report EAL 3+ Evaluation of Extreme Networks ExtremeXOS Network Operating System v12.3.6.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria
Certification Report
Certification Report EAL 3+ Evaluation of RSA envision platform v4.0 SP 1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
Certification Report
Certification Report McAfee Network Security Platform v7.1 (M-series sensors) Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
Certification Report
Certification Report EAL 3+ Evaluation of AccessData Cyber Intelligence and Response Technology v2.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria
Certification Report
Certification Report HP Network Automation Ultimate Edition 10.10 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government
Certification Report
Certification Report EAL 4+ Evaluation of BlackBerry Enterprise Server version 5.0.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
Certification Report
Certification Report EAL 2+ Evaluation of Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications
Certification Report
Certification Report EAL 4+ Evaluation of WatchGuard Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of
Certification Report
Certification Report EAL 4+ Evaluation of ncipher nshield Family of Hardware Security Modules Firmware Version 2.33.60 Issued by: Communications Security Establishment Canada Certification Body Canadian
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
Global Endpoint Security Market 2015-2019
Brochure More information from http://www.researchandmarkets.com/reports/3097865/ Global Endpoint Security Market 2015-2019 Description: About Endpoint Security Endpoint security is a methodology that
Certification Report
Certification Report Symantec Network Access Control Version 12.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme
Korea IT Security Evaluation and Certification Scheme
Korea IT Security Evaluation and Certification Scheme 2005. 9. 28 Korea Certification Body Dae Ho, Lee Agenda I KECS Introduction II Role and Responsibility of CB III Evaluation and Certification Procedure
22 July, 2010 IT Security Center (ISEC) Information-technology Promotion Agency (IPA) Copyright 2010 Information-Technology Promotion Agency, Japan 1
22 July, 2010 IT Security Center (ISEC) Information-technology Promotion Agency (IPA) Copyright 2010 Information-Technology Promotion Agency, Japan 1 Introduction of IPA Copyright 2010 Information-Technology
Certification Report
Certification Report EAL 3+ Evaluation of Rapid7 Nexpose Vulnerability Management and Penetration Testing System V5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian
Constructing Trusted Code Base XIV
Constructing Trusted Code Base XIV Certification Aleksy Schubert & Jacek Chrząszcz Today s news (on tvn24bis.pl) (June 6th on BBC) security vulnerability CVE-2014-0224 was discovered by Masashi Kikuchi
Certification Report
Certification Report EAL 2 Evaluation of with Gateway and Key Management v2.9 running on Fedora Core 6 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria
Malaysian Common Criteria Evaluation & Certification (MyCC) Scheme Activities and Updates. Copyright 2010 CyberSecurity Malaysia
Malaysian Common Criteria Evaluation & Certification (MyCC) Scheme Activities and Updates Copyright 2010 CyberSecurity Malaysia Agenda 1. Understand Why we need product evaluation and certification ICT
Certification Report
Certification Report EAL 2+ Evaluation of Symantec Endpoint Protection Version 12.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and
Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off
Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off Times have Changed & A/V Executives Agree An A/V product as your sole endpoint protection solution isn t enough.
Certification Report - Firewall Protection Profile and Firewall Protection Profile Extended Package: NAT
Template: CSEC_mall_doc.dot, 7.0 Ärendetyp: 6 Diarienummer: 14FMV10188-21:1 Dokument ID CB-015 HEMLIG/ enligt Offentlighets- och sekretesslagen (2009:400) 2015-06-12 Country of origin: Sweden Försvarets
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
- Table of Contents -
- Table of Contents - 1 INTRODUCTION... 1 1.1 TARGET READERS OF THIS DOCUMENT... 1 1.2 ORGANIZATION OF THIS DOCUMENT... 2 1.3 COMMON CRITERIA STANDARDS DOCUMENTS... 3 1.4 TERMS AND DEFINITIONS... 4 2 OVERVIEW
Firewall Test. Firewall protection in public networks. Commissioned by CHIP. Language: English. Last Revision: 11 th April 2014
Firewall Test Firewall protection in public networks Commissioned by CHIP Language: English Last Revision: 11 th April 2014 www.av-comparatives.org Commissioned by - 1 - Contents Firewall protection in
Information Security Specialist Training on the Basis of ISO/IEC 27002
Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu
Are you prepared to be next? Invensys Cyber Security
Defense In Depth Are you prepared to be next? Invensys Cyber Security Sven Grone Critical Controls Solutions Consultant Presenting on behalf of Glen Bounds Global Modernization Consultant Agenda Cyber
Certification Report
Certification Report Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications Security Establishment,
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
Korean National Protection Profile for Voice over IP Firewall V1.0 Certification Report
KECS-CR-16-36 Korean National Protection Profile for Voice over IP Firewall V1.0 Certification Report Certification No.: KECS-PP-0717-2016 2016. 6. 10 IT Security Certification Center History of Creation
Prinect. Is Your Prinect Workflow Safe from a Cyber Attack?
Prinect Is Your Prinect Workflow Safe from a Cyber Attack? Anti-Virus Software & Your Prinect Workflow Security is a key concern of today s digital world. Fully protecting your business requires a multi-prong
Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme
NIST Special Publication 800-51 Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme Recommendations of the National Institute of Standards and Technology Peter Mell Tim Grance
Global Security Software Market 2015-2019
Brochure More information from http://www.researchandmarkets.com/reports/3129404/ Global Security Software Market 2015-2019 Description: About Security Software Security software comprise a suite of security
Certification Report
Certification Report EAL 4 Evaluation of Desktop: Enterprise Whole Disk Encryption Only Edition, Version 9.10.0 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria
How To Evaluate Watchguard And Fireware V11.5.1
Certification Report EAL 4+ Evaluation of WatchGuard and Fireware XTM Operating System v11.5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation
Managing internet security
Managing internet security GOOD PRACTICE GUIDE Contents About internet security 2 What are the key components of an internet system? 3 Assessing internet security 4 Internet security check list 5 Further
Fully supported Antivirus software (Managed Antivirus)
You are here: Antivirus > Managed Antivirus Vendors Fully supported Antivirus software (Managed Antivirus) Antivirus (AV) vendors often release software updates. We hard-code the update into our RMM agent
Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities?
ANALYST BRIEF Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities? Author Randy Abrams Tested Products Avast Internet Security 7 AVG Internet Security 2012 Avira Internet Security
Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT
Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT TESTED PRODUCTS: AVG Internet Security Network Edition v8.0 Kaspersky Total Space Security v6.0 McAfee Total Protection for Endpoint Sophos
Understanding the Total Cost of Ownership for Endpoint Security Solutions. A TCO White Paper
Understanding the Total Cost of Ownership for Endpoint Security Solutions A TCO White Paper Author: Kara Casten Hobson & Company March 2009 Executive Summary Organizations considering moving to an endpoint
University of Central Florida Class Specification Administrative and Professional. Information Security Officer
Information Security Officer Job Code: 2534 Serve as the information security officer for the University. Develop and computer security system standards, policies, and procedures. Serve as technical team
Towards a new transportation culture: technology innovations for safe, efficient and sustainable mobility. Russian practice.
Towards a new transportation culture: technology innovations for safe, efficient and sustainable mobility. Russian practice. Joint BELGIUM - UNECE Inland Transport Committee (ITC) workshop on Intelligent
Certification Report
Certification Report EAL 4+ Evaluation of Entrust Authority Security Manager and Security Manager Administration v8.1 SP1 Issued by: Communications Security Establishment Canada Certification Body Canadian
Comparison of Costs and Return on Investments of IT Investments
Comparison of Costs and Return on Investments of IT Investments SaaS and Traditional Applications A business owner s guide to understanding the cost benefit of implementing Software as a Service based
Certification Report
Certification Report HP Universal CMDB and Universal Discovery v10.21 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government
Certification Report
Certification Report McAfee Network Security Platform M-Series and NS- Series Sensors Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification
Certification Report
Certification Report EAL 2+ Evaluation of Symantec Endpoint Protection Version 11.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
CORPORATE AV / EPP COMPARATIVE ANALYSIS
CORPORATE AV / EPP COMPARATIVE ANALYSIS Exploit Evasion Defenses 2013 Randy Abrams, Dipti Ghimire, Joshua Smith Tested Vendors AVG, ESET, F- Secure, Kaspersky, McAfee, Microsoft, Norman, Panda, Sophos,
Plugin for Cisco NAC (Network Admission Control) Installation Guide
Plugin for Cisco NAC (Network Admission Control) Installation Guide Contents 1. Cisco Network Admission Control (NAC)...3 1.1 Advantages of NAC... 3 1.2 How does NAC work?... 3 2. ESET NAC plugin requirements...4
SECURITY CONSIDERATIONS FOR LAW FIRMS
SECURITY CONSIDERATIONS FOR LAW FIRMS Enterprise Risk Management Professional consulting firm that specializes in cyber security Founded in 1998 in Miami, Florida Serves more than 150 clients, locally,
INDEPENDENT VALIDATION OF FORTINET SOLUTIONS. NSS Labs Real-World Group Tests
INDEPENDENT VALIDATION OF FORTINET SOLUTIONS NSS Labs Real-World Group Tests INDEPENDENT VALIDATION OF FORTINET SOLUTIONS Introduction Organizations can get overwhelmed by vendor claims and alleged silver
Strategies To Effective PCI Scoping ISACA Columbus Chapter Presentation October 2008
Strategies To Effective PCI Scoping ISACA Columbus Chapter Presentation October 2008 Matthew T. Davis SecureState, LLC [email protected] SecureState Founded in 2001, Based on Cleveland Specialized
The SAProuter An Internet Window to your SAP Platform (and beyond)
The SAProuter An Internet Window to your SAP Platform (and beyond) July 2, 2010 HITBSecConf, Amsterdam Disclaimer This publication is copyright 2010 Onapsis SRL All rights reserved. No portion of this
MODULE 7 REFERENCE TO ACCREDITATION AND ADVERTISING
7.1 INTRODUCTION MODULE 7 REFERENCE TO ACCREDITATION AND ADVERTISING All AIHA Laboratory Accreditation Programs (AIHA-LAP), LLC Accredited laboratories are encouraged to advertise their accreditation by
NetFinder Insight Series - Network Security
NetFinder Insight Series - Network Security Market Snapshot Report 26/09/2012 Version: 1.0 NetFinder Insight Series - Network Security Released by: Research Document Number: MDMS-117-996 Author: Clair
Certification Report
Certification Report EAL 2+ Evaluation of Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme 2008 Government of Canada, Communications
OPEN JOINT STOCK COMPANY SBERBANK OF RUSSIA
OPEN JOINT STOCK COMPANY SBERBANK OF RUSSIA APPROVED BY the Supervisory Board Sberbank of Russia Minutes dated July, 20 No. 32 REGULATIONS for Informing the Supervisory Board of Sberbank of Russia on the
Zero-Day and Less-Than-Zero-Day Vulnerabilities and Exploits in Networked Infrastructures 1
Zero-Day and Less-Than-Zero-Day Vulnerabilities and Exploits in Networked Infrastructures 1 Hartmut Pohl All computers are at risk from security vulnerabilities that are generally unknown to the user and
A Study on Behavior Patternize in BYOD Environment Using Bayesian Theory
A Study on Behavior Patternize in BYOD Environment Using Bayesian Theory Dongwan Kang, Myoungsun Noh, Chaetae Im Abstract Since early days, businesses had started introducing environments for mobile device
Information Technology Policy
Information Technology Policy Security Information and Event Management Policy ITP Number Effective Date ITP-SEC021 October 10, 2006 Category Supersedes Recommended Policy Contact Scheduled Review [email protected]
Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments
Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments Abhishek Majumder, Suyel Namasudra and Samir Nath Abstract Cloud computing is an emerging and highly attractive technology
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
This is a preview - click here to buy the full publication
TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems
ESET a pioneer of IT security since 1987
ESET a pioneer of IT security since 1987 ESET Growth 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 Gross Revenue for the last 12 years in
GSA FIPS 201 Evaluation Program
GSA FIPS 201 Evaluation Program David Temoshok Director, Federal Identity Policy and Management GSA Office of Governmentwide Policy NIST/DHS/TSA TWIC QPL Workshop April 21, 2010 1 HSPD-12 Government-wide
Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP [email protected]
Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP [email protected] Security Security is recognized as essential to protect vital processes and the systems that provide those
S-Terra CSP: the future champion of the Russian network security market
S-Terra CSP: the future champion of the Russian network security market CONTENT Who do we are? Why are we better? Why we must win? 2003, 2004 S-Terra CSP 2 Origin of the «S-Terra CSP» NPO ELAS legendary
Insecurity in Security Software
Insecurity in Security Software Maik Morgenstern Andreas Marx AV-Test GmbH http://www.av-test.org Virus Bulletin 2005 Conference presentation about Insecurity in Security Software Copyright 2005 AV-Test
SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About?
SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About? Matthias G. Eckermann Senior Product Manager SUSE Linux Enterprise [email protected] Agenda Evaluation
Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT
Telecom Testing and Security Certification A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT 1 Need for Security Testing and Certification Telecom is a vital infrastructure
Bypassing Network Access Control Systems
1 Bypassing Network Access Control Systems Ofir Arkin, CTO Blackhat USA 2006 [email protected] http://www.insightix.com 2 What this talk is about? Introduction to NAC The components of a NAC solution
