French Scheme CSPN to CC Evaluation
|
|
|
- Jeffery Jackson
- 9 years ago
- Views:
Transcription
1 French Scheme CSPN to CC Evaluation Antoine COUTANT ITSEF AMOSSYS 4 bis allée du bâtiment Rennes [email protected] Abstract. Since 2008, French certication body created a new scheme for a specic evaluation: CSPN evaluation. For a target of evaluation (TOE), this French certication requires to analyse its security target, test its compliance and perform an intrusion tests in a constrained time. So, this evaluation is performed within certain time and workload constraints so as to meet the requirements for mastering costs and time limits. The goal is to attest that a product (target of evaluation) successfully passed an evaluation by ANSSI licensed evaluation facility. This kind of evaluation is conducted under the terms of the conformity analysis (verify that a product is conform to its security specications, see a product as a whole to perform relevant analyses) and analysis of eciency (rate the theoretical strength of the security functions and mechanisms, identify vulnerabilities). This paper focuses mainly on introducing the CSPN evaluation and briey explaining the dierence between CSPN and Common Criteria evaluation. Finally, we'll see that these two schemes are complementary and can be used consecutively. Keywords: CSPN, CC evaluation 1 Introduction CSPN 1 evaluation is a methodology created by the French certication body (called ANSSI). This scheme is the result of a pragmatic response to the civil market needs. Indeed, Common Criteria (i.e. CC) are exible and robust guides for specications and requirements of security assurances. CC can provide a methodological evaluation without specic requirements concerning the technical aspect. However, CC evaluation can become a real headache without prior delimitation of the TOE (Target Of Evaluation) functional scope. In addition, security products have heterogeneous and complex basic mechanisms, often beyond the normative framework and more and more integrated with the operating system or the operating environment. 1 Certication de Sécurité de Premier Niveau which can be translated by First Level Security Certication
2 The implementation of the CSPN scheme meets the needs of the evaluation market for civil security products (constrained time suitable for products versioning, cost-optimized) and also purely technical needs such as technical expertise methodological completeness. The CSPN takes also into account recomendation by french deputy Lasbordes [5]. CSPN certication (implemented on a trial basis from May 2008 to May 2011) is based on criteria [1] and methodology [2] developed by French certication body. The main objective is to verify that a product meets its security requirements. In brief, the objectives of the CSPN evaluation tasks are: Verify that the product is compliant with its security specications; Theoretically rate the mechanisms and list the known vulnerabilities of products of the same type; Test the product to try to bypass its security functions. 2 CSPN Scheme To limit functional scope, ANSSI dened categories of products to be evaluated. Procedure for CSPN evaluation [3] denes the following categories (a product may be associated with one or more of these technical elds): Intrusion detection; Anti-virus and protection against malicious codes; Firewall; Data deletion; Administration security and supervision; Identication, authentication and access control; Secure communication; Secure messaging; Secure storage; Embedded hardware and software. This certication process includes sponsor(s), evaluation facility (ITSEF 2 or evaluation facility licensed by the ANSSI in one or more technical areas of expertise), ANSSI certication body and possibly the developers of the product submitted for evaluation. CSPN is intended to conduct evaluations in a constrained time, thus limiting sponsor budget and, most importantly, adapting the product development life-cycle to the civil market. The sponsor is responsible for providing the security target of the product, the product itself and the product's documentation if available. If essential security features are implemented using cryptographic mechanisms, the sponsor must ensure that the documentation for these mechanisms is available ([4]). 2 Information Technology Security Evaluation Facility
3 The application of this methodology emphasizes technical expertise (balance ecacy/compliance functions) without neglecting methodological aspects. Laboratories responsible for these evaluations are licensed by ANSSI attesting both their competence on the specic technological building blocks (reverse engineering, cryptography, intrusion detection, network security,... ) but also their independence. It should be noted that ANSSI may refuse a certication from a sponsor if the product does not implement security functions, has an incomplete security target (not conform or obviously misleading), is too complex to be evaluated, uses cryptographic algorithms not compliant to the standard... ANSSI issues a certicate with french scope in light of an Evaluation Technical Report (ETR) issued by a licensed laboratory (ETR is the document containing the results of the evaluation). The input documents for this work are: The security target of the TOE; The TOE in the version choosen for the evaluation; The public documentation of the evaluated product; Installation, conguration and administration manuals; The cryptographic specications of the TOE (if applicable); The source code for cryptographic mechanisms of the TOE (if applicable). Obviously, the laboratory conducting the evaluation must have access to the TOE and to test equipments if they are specic or dedicated. The issued evaluation document is the ETR and the plan is xed in [2]. The performance of the evaluation relies on the existing documentation, public vulnerability bases to test known vulnerabilities and the product itself (installed on a test platform that is as representative as possible of the foreseen usage environment). The evaluation process is divided into nine phases described below. 2.1 Step #1 - Security Target Analysis The evaluator should verify, in detail, that the security target contains the expected elements identied in the ANSSI methodology [2]. The required contents of a security target are: 1. An unambiguous identication of the product to evaluate (the TOE); 2. A product rationale describing in natural language for what purpose the product was designed, by whom and in what context it is supposed to be used; 3. The precise technical environment where the product runs/operates (computer model, operating system,... ); 4. The sensitive assets that the product must protect; 5. Protection oered against identied threats; 6. Security functions implemented by the product to counter identied threats (these functions will be subject to evaluation).
4 2.2 Step #2 - TOE Installation The installation is done following the documentation provided by the sponsor. As a CC evaluation, the architecture of the platform evaluation is consistent with that proposed in the Security Target. The main objective of this task is identify non-compliances with the provided documentation, conrm that documentation is clear and unambiguous, identify any particular parameterization of the underlying system. 2.3 Step #3 - Analysis of compliance The objective of this task is verify that the product is assessed according to its specications. According with the CSPN evaluation process, the compliance study will be based on an analysis of existing documentation to advise on its readability and completness, compliance testing of security functions identied in the Security Target and a review of source code (if applicable). The documents to be analyzed are mainly those provided by a developer and/or sponsor. The evaluator should identify the level of documentation features. This step will also assess the security of programming code to ensure that rules of good practice, in terms of specication and design, have been met (use consistent naming conventions, structure and modularity for source code, clarity and presence of relevant comments). 2.4 Step #4 - Resistance Analysis for Functions and Mechanisms There are two ways to dene mechanism robustness: Theoretical rating. This phase measures the eciency and robustness of theoretical mechanisms specied by the TOE. Typically, for cryptographic mechanisms, a known quantitative metric exists to rate the theoretical robustness of dierent algorithms (e.g.: based on the computational complexity). Empirical rating. This task measures the actual resistance for mechanisms specied by the target of evaluation. Like the previous step, this task is performed in both black box and white box through code review. The evaluator will have to identify mechanisms implementing the security features of the evaluated product and analyze the operation of each mechanism. The evaluator will have to provide a listing of each mechanism. Thus, the evaluator can estimate the strength of functions based on the mechanisms and the overall strength of the product in terms of security. 2.5 Step #5 - Vulnerability Analysis Evaluator must identify known vulnerabilities (intrinsic, constructional, operational) based on their own skills and the exploitation of vulnerability databases.
5 The task is to extract relevant vulnerabilities and verify wether and how they can be exploited. Two types can be addressed: specic to the product ones and generic ones, potentially applicable. The objective is to identify vulnerabilities to evaluated product (not with in an ocial patch, or a workaround to limit eects of the vulnerability), identify known vulnerabilities for products in the same category, implement, test and validate some vulnerabilities (according to feasibility, operability, no patch... ). This vulnerability synthesis will then identify those applicable to the audited code. The identication of vulnerabilities will be based on a three-step process: 1. Identication of public vulnerabilities; 2. Architecture and source code analysis (emphasis on critical functions); 3. Use of static analysis and test code tools by generating random data (fuzzing). 2.6 Step #6 - Ease of Use For this step, the evaluator must identify when the product can be congured or used in any unsafe way, identify possible non-intrinsically safe functionalities that should not be used if they contribute to lead to an exploitable vulnerability. Finally, evaluator provides, when possible, recommendations for safe use of the TOE despite its potential vulnerabilities. 2.7 Step #7 - Evaluation of Cryptographic Mechanisms (if applicable) Cryptographic mechanisms are evaluated in relation with ANSSI cryptology lab. This step has two axes: Check compliance of cryptographic mechanisms to ANSSI cryptographic standard requirements. This verication is done by analyzing the documentation which must contain at least the description of cryptographic functions, reference algorithms, key size, key distribution, key generation, key transmission, the description of pretreatment before encryption, the description of post-processing after encryption; Check implementation conformity of these mechanisms in relation to their description by comparing product results to a reference implementation and analyze source code with optionally unit tests of some functions. 2.8 Step #8 - Developers Interview (optional) Wherever possible (and if necessary), evaluator contacts product developers. The main goal of these discussions is to retrieve or dig additional information or some interesting points that are not detailed in the documentation provided with the product.
6 2.9 Step #9 - Synthesis Evaluator writes an expert opinion which summarizes obtained results during these dierent steps. This summary is addressed for technical readers. 3 CSPN to CC Evaluation 3.1 CSPN feedbacks According to CSPN scheme emitted by ANSSI, the necessary workload for this analysis is 25 men days with 10 men days added if the product implements cryptographic mechanisms. The time limit is 8 calendar weeks. For a CSPN, the average time is approximately 2 months while for a CC evaluation, the average time is 1 year. The CSPN certication provides useful recommendations for use to overcome the possible limitations of an evaluated product. Actually, the ratio of successful CSPN evaluations is about 50%. Main conclusion of these evaluations are that developers tend to focus on their core business and do not provide a comprehensive security in the design. Thus, many vulnerabilities (design, construction or operation) can be identied by laboratories performing CSPN. This scheme is selective enough to lter out the less safe products, it provides a good overview of the security level for security products, oers good guarantees of success for a developer (or sponsor) wishing to target a CC certication but has yet to evolve to facilitate the expertise reproducibility. It can be advised, for the latter, that it should be necessary to develop a specic methodology for each category as well as an industrialized conformity and vulnerability analyzes. Indeed, for example, the needs of CSPN tasks for an application developped in Java are totally dierent than a digital tablet. Today, the results of dierent CSPN certication tend to this conclusion. 3.2 Two complementary evaluations The evaluation approach according to Common Criteria starts with the Security Target Evaluation and continues with the Product Evaluation which can be divided in two parts: development documents with source code analysis (if applicable) and product testing (conformity, eciency, vulnerabilities). Results are also described on a ETR. This document is used to emit the certicate provided by certication body. The gure below (gure 1) is a generic example of CC evaluation. Security target (ST) evaluation is a prerequisite for all others activities. Indeed, ST is the reference document for evaluator and mandatory to understand the following steps for the evaluation. In practice, security target is used and controlled throughout the evaluation. For example, development analysis and life-cycle are linked: source management can show the used modularity approach. User documentation analysis is done in parallel to these two tasks. Finally, test analysis (developer tests plan) and vulnerabilities analysis are strongly linked.
7 Fig. 1. Common Criteria Evaluation The following table draws a parallel between concerned Common Criteria classes and CSPN works. CC classes CSPN works ASE Security Target Analysis AGD_OPE Ease of Use AGD_PRE TOE Installation ATE_IND Analysis of compliance Resistance Analysis AVA_VAN Vulnerability Analysis Cryptographic Evaluation A Common Criteria evaluation, as well as the CSPN, aims to ensure that the security services announced by a TOE are actually achieved. There are similarities between entries of these two types of evaluation. Four basic proof elements are the target of evaluation, the scope of evaluation, guides (use and/or administration) and the expression of security functions. In both evaluation schemes, these elements help an evaluator to understand the TOE, help his analysis and to prepare its nal report. Vulnerability research, testing and source code audit (if applicable) are seminal works of the evaluation activity. Common Criteria provide an additional perspective on matters relating to the TOE development (life-cycle, development environment,... ) or the shape of which is exposed the security issue (for example, no SFR 3 denition for CSPN 3 Security Functional Requirements
8 works). This nding helps to understand the form of inclusion between CSPN and CC evaluation (at constant perimeter). In the practice, we can observe that CSPN works done before CC evaluation are intended to reduce eects for an inadequate consideration of the security issue by the TOE and, nally, prepare the TOE to a future analysis on the background with Common Criteria. Moreover, in this context, it is possible to reduce from 20 to 30% the cost of a CC evaluation, following a CSPN evaluation, on the same product. This solution has already been successfully by ITSEF with clients who have chosen to begin their certication process by a CSPN in order to progress to CC. 4 Conclusion The CSPN approach is complementary to Common Criteria evaluation. The philosophy is the "quick-win" so reliable results in constrained time. Analyzes are primarily intended to ensure the robustness of a TOE. For a developer and/or sponsor willing to begin a certication process, CSPN works followed by CC works are a good compromise for a certicate as soon as possible. Indeed, CSPN works can "roughing" a TOE by addressing vulnerabilities within constrained time. Following CSPN works, a developer can potentially improve the security of its own product (based on CSPN analysis) before starting the CC process which will focus on life-cycle development, architecture,.... CSPN scheme is a methodology focused primarily on technical side allowing to have a relative condence in a product. CSPN certicate certies that a product has successfully passed an evaluation by a laboratory licensed by the French certication body (ANSSI). This scheme is characterized by balanced analytical works between eciency and compliance, evaluation tasks completed in a constrained time, the opportunity to conduct an evaluation without strong involvement for developer and, at the end, a certicate with national validity range which is issued by ANSSI. However, it appears that, in a (near?) future, specic methodologies according to analyzed products must be implemented. This will streamline workloads on the product analyzed. References [1] ANSSI Criteria for the rst level security evaluation of information technologies, CSPN-evaluation criteria, latest version available at [2] ANSSI Evaluation methodology for CSPN certication and ETR expected content, latest version available at [3] ANSSI Procedure for CSPN evaluation, latest version available at [4] ANSSI Supplies necessary for an analysis of cryptographic mechanisms, latest version available at [5] Pierre Lasbordes La sécurité des systèmes d'information - Un enjeu majeur pour la France. 2005
Courtesy Translation
Direction centrale de la sécurité des systèmes d information Protection Profile Electronic Signature Creation Application Date : July 17th, 2008 Reference : Version : 1.6 Courtesy Translation Courtesy
Software development process
OpenStax-CNX module: m14619 1 Software development process Trung Hung VO This work is produced by OpenStax-CNX and licensed under the Creative Commons Attribution License 2.0 Abstract A software development
SYSTEMS AND SOFTWARE REQUIREMENTS SPECIFICATION (SSRS) TEMPLATE. Version A.4, January 2014 FOREWORD DOCUMENT CONVENTIONS
SYSTEMS AND SOFTWARE REQUIREMENTS SPECIFICATION (SSRS) TEMPLATE Version A.4, January 2014 FOREWORD This document was written to provide software development projects with a template for generating a System
SAMSUNG SDS FIDO Server Solution V1.1 Certification Report
KECS-CR-15-73 SAMSUNG SDS FIDO Server Solution V1.1 Certification Report Certification No.: KECS-ISIS-0645-2015 2015. 9. 10 IT Security Certification Center History of Creation and Revision No. Date Revised
Common Criteria For Information Technology Security Evaluation
Security Characterisation and Integrity Assurance for Software Components and Component-Based Systems Jun Han and Yuliang Zheng Peninsula School of Computing and Information Technology Monash University,
Lessons learnt in writing PP/ST. Wolfgang Killmann T-Systems
Lessons learnt in writing PP/ST Wolfgang Killmann T-Systems Overview of the talk Lessons learnt in writing PP/ST Practical experience of PP/ST writing Issues with and suggestions for PP/ST writing Conformance
Safeguards Frameworks and Controls. Security Functions Parker, D. B. (1984). The Many Faces of Data Vulnerability. IEEE Spectrum, 21(5), 46-49.
Safeguards Frameworks and Controls Theory of Secure Information Systems Features: Safeguards and Controls Richard Baskerville T 1 F 1 O 1 T 2 F 2 O 2 T 3 F 3 O 3 T 4... T n...... F l O m T F O Security
Certification Report
Certification Report EAL 4 Evaluation of SecureDoc Disk Encryption Version 4.3C Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
Common Criteria Evaluations for the Biometrics Industry
Common Criteria Evaluations for the Biometrics Industry Kathy Malnick Senior Manager Criterian Independent Labs An initiative of the WVHTC Foundation Presentation outline Common Criteria defined Common
Korean National Protection Profile for Voice over IP Firewall V1.0 Certification Report
KECS-CR-16-36 Korean National Protection Profile for Voice over IP Firewall V1.0 Certification Report Certification No.: KECS-PP-0717-2016 2016. 6. 10 IT Security Certification Center History of Creation
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
Supporting Document Guidance. Smartcard Evaluation. February 2010. Version 2.0 CCDB-2010-03-001
Supporting Document Guidance Smartcard Evaluation February 2010 Version 2.0 CCDB-2010-03-001 Foreword This is a supporting document, intended to complement the Common Criteria and the Common Evaluation
Initial Roadmap: Point-to-Point Encryption Technology and PCI DSS Compliance
Emerging Technology Whitepaper Initial Roadmap: Point-to-Point Encryption Technology and PCI DSS Compliance For Transmissions of Cardholder Data and Sensitive Authentication Data Program Guide Version
22 July, 2010 IT Security Center (ISEC) Information-technology Promotion Agency (IPA) Copyright 2010 Information-Technology Promotion Agency, Japan 1
22 July, 2010 IT Security Center (ISEC) Information-technology Promotion Agency (IPA) Copyright 2010 Information-Technology Promotion Agency, Japan 1 Introduction of IPA Copyright 2010 Information-Technology
Certification Report
Certification Report EAL 2 Evaluation of with Gateway and Key Management v2.9 running on Fedora Core 6 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria
Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik
Common Criteria Protection Profile Cryptographic Modules, Security Level Enhanced BSI-CC-PP-0045 Endorsed by the Foreword This Protection Profile - Cryptographic Modules, Security Level Enhanced - is issued
Certification Report
Certification Report McAfee Network Security Platform v7.1 (M-series sensors) Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
Certification Report
Certification Report HP Network Automation Ultimate Edition 10.10 Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
MSCA 31000 Introduction to Statistical Concepts
MSCA 31000 Introduction to Statistical Concepts This course provides general exposure to basic statistical concepts that are necessary for students to understand the content presented in more advanced
Managing large sound databases using Mpeg7
Max Jacob 1 1 Institut de Recherche et Coordination Acoustique/Musique (IRCAM), place Igor Stravinsky 1, 75003, Paris, France Correspondence should be addressed to Max Jacob ([email protected]) ABSTRACT
Certification Report
Certification Report EAL 2+ Evaluation of Symantec Endpoint Protection Version 11.0 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
Courtesy Translation
PREMIER MINISTRE Secretariat General for National Defence French Network and Information Security Agency Certification Report ANSSI-CC-2010/15 OmniPCX Enterprise solution : OmniPCX Enterprise (release
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile
Preparing for the HIPAA Security Rule
A White Paper for Health Care Professionals Preparing for the HIPAA Security Rule Introduction The Health Insurance Portability and Accountability Act (HIPAA) comprises three sets of standards transactions
Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT
Telecom Testing and Security Certification A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT 1 Need for Security Testing and Certification Telecom is a vital infrastructure
Feedback Ferret. Security Incident Response Plan
Feedback Ferret Security Incident Response Plan Document Reference Feedback Ferret Security Incident Response Plan Version 3.0 Date Created June 2013 Effective From 20 June 2013 Issued By Feedback Ferret
Cutting Edge Practices for Secure Software Engineering
Cutting Edge Practices for Secure Software Engineering Kanchan Hans Amity Institute of Information Technology Amity University, Noida, 201301, India [email protected] Abstract Security has become a high
WhiteHat Security White Paper. Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program
WhiteHat Security White Paper Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program October 2015 The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information
CIP 010 1 Cyber Security Configuration Change Management and Vulnerability Assessments
CIP 010 1 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:
Certification Report
Certification Report McAfee Network Security Platform M-Series and NS- Series Sensors Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification
90% of data breaches are caused by software vulnerabilities.
90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with
ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters
When Recognition Matters WHITEPAPER ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS www.pecb.com CONTENT 3 4 5 6 6 7 7 7 7 8 8 8 9 9 9
Certification Report
Certification Report EAL 4+ Evaluation of Entrust Authority Security Manager and Security Manager Administration v8.1 SP1 Issued by: Communications Security Establishment Canada Certification Body Canadian
Mobile Billing System Security Target
Mobile Billing System Security Target Common Criteria: EAL1 Version 1.2 25 MAY 11 Document management Document identification Document ID Document title Product version IDV_EAL1_ASE IDOTTV Mobile Billing
CIP-005-5 Cyber Security Electronic Security Perimeter(s)
A. Introduction 1. Title: Cyber Security Electronic Security Perimeter(s) 2. Number: CIP-005-5 3. Purpose: To manage electronic access to BES Cyber Systems by specifying a controlled Electronic Security
How to Design and Maintain a Secure ICS Network
Whitepaper How to Design and Maintain a Secure ICS Network Support IEC 62443 Compliance with SilentDefense ICS Authors Daniel Trivellato, PhD - Product Manager Industrial Line Dennis Murphy, MSc - Senior
1. Introduction MINING AND TRACKING EVOLVING WEB USER TRENDS FROM LARGE WEB SERVER LOGS. Basheer Hawwash and Olfa Nasraoui
MINING AND TRACKING EVOLVING WEB USER TRENDS FROM LARGE WEB SERVER LOGS Basheer Hawwash and Olfa Nasraoui Knowledge Discovery and Web Mining Lab Dept. of Computer Engineering and Computer Science University
MovieLabs Specification for Enhanced Content Protection Version 1.0
MovieLabs Specification for Enhanced Content Protection Version 1.0 Introduction Digital content distribution technologies are evolving and advancing at a rapid pace. Content creators are using these technologies
Information Technology Security Evaluation Criteria. ITSEC Joint Interpretation Library (ITSEC JIL)
S Information Technology Security Evaluation Criteria ITSEC Joint Interpretation Library (ITSEC JIL) Version 2.0 November 1998 This document is paginated from i to vi and from 1 to 65 ITSEC Joint Interpretation
Symantec Client Management Suite 8.0
IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
Common Methodology for Information Technology Security Evaluation. Evaluation methodology. September 2012. Version 3.1 Revision 4 CCMB-2012-09-004
Common Methodology for Information Technology Security Evaluation Evaluation methodology September 2012 Version 3.1 Revision 4 CCMB-2012-09-004 Foreword This version of the Common Methodology for Information
Architecture bits. (Chromosome) (Evolved chromosome) Downloading. Downloading PLD. GA operation Architecture bits
A Pattern Recognition System Using Evolvable Hardware Masaya Iwata 1 Isamu Kajitani 2 Hitoshi Yamada 2 Hitoshi Iba 1 Tetsuya Higuchi 1 1 1-1-4,Umezono,Tsukuba,Ibaraki,305,Japan Electrotechnical Laboratory
Power of Oracle in the Cloud
Power of Oracle in the Cloud www.reliason.com Whitepaper W Overview The Oracle technology is known for its power, productivity and robustness. Likewise, Oracle cloud service is also backed by these features
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION
COMMON CRITERIA PROTECTION PROFILE EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION Draft Version 1.0 TURKISH STANDARDS INSTITUTION TABLE OF CONTENTS Common Criteria Protection Profile...
Network Security: A Critical Component to Any Business IT Plan. www.cognoscape.com
Network Security: A Critical Component to Any Business IT Plan www.cognoscape.com Network Security: A Critical Component to Any Business IT Plan In this day and age, every business, no matter its size
MS Information Security (MSIS)
MS Information Security (MSIS) Riphah Institute of Systems Engineering (RISE) Riphah International University, Islamabad, Pakistan 1. Program Overview: The program aims to develop core competencies in
Strategic Program Management
Governance Assessment Organizational Change Management Strategic Program Management Continuous Improvement Framework Processes Strategy Strategic Program Management Bob Prieto Published by Construction
Appendix B Data Quality Dimensions
Appendix B Data Quality Dimensions Purpose Dimensions of data quality are fundamental to understanding how to improve data. This appendix summarizes, in chronological order of publication, three foundational
Citrix Password Manager, Enterprise Edition Version 4.5
122-B COMMON CRITERIA CERTIFICATION REPORT No. CRP235 Citrix Password Manager, Enterprise Edition Version 4.5 running on Microsoft Windows and Citrix Presentation Server Issue 1.0 June 2007 Crown Copyright
Cloud Security Who do you trust?
Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud
A study on Security Level Management Model Description
A study on Security Level Management Model Description Tai-Hoon Kim Dept. of Multimedia, Hannam University, Daejeon, Korea [email protected] Kouichi Sakurai Dept. of Computer Science & Communication Engineering,
SOFTWARE ASSET MANAGEMENT Continuous Monitoring. September 16, 2013
SOFTWARE ASSET MANAGEMENT Continuous Monitoring September 16, 2013 Tim McBride National Cybersecurity Center of Excellence [email protected] David Waltermire Information Technology Laboratory [email protected]
Certification Report
Certification Report EAL 4+ Evaluation of WatchGuard Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of
Joint Interpretation Library. Guidance for smartcard evaluation
Joint Interpretation Library Guidance for smartcard evaluation Version 2.0 February 2010 Table of content 1. REFERENCES 5 2. OBJECTIVE 6 3. SMARTCARD PRODUCT PRESENTATION AND DEFINITIONS 7 3.1. Glossary
Table of Contents. Application Vulnerability Trends Report 2013. Introduction. 99% of Tested Applications Have Vulnerabilities
Application Vulnerability Trends Report : 2013 Table of Contents 3 4 5 6 7 8 8 9 10 10 Introduction 99% of Tested Applications Have Vulnerabilities Cross Site Scripting Tops a Long List of Vulnerabilities
NIST Cyber Security Activities
NIST Cyber Security Activities Dr. Alicia Clay Deputy Chief, Computer Security Division NIST Information Technology Laboratory U.S. Department of Commerce September 29, 2004 1 Computer Security Division
Thesis work and research project
Thesis work and research project Hélia Pouyllau, INRIA of Rennes, Campus Beaulieu 35042 Rennes, [email protected] July 16, 2007 1 Thesis work on Distributed algorithms for endto-end QoS contract
OLB certification process for Forestry Companies GP01
OLB certification process for Forestry Companies GP01 Reference: GP01 OLB FC 1.2 version, 22/03/2013 Bureau Veritas Certification France 60 Général de Gaulle Avenue - 92046 Paris - La Défense Cedex - France
How To Evaluate Watchguard And Fireware V11.5.1
Certification Report EAL 4+ Evaluation of WatchGuard and Fireware XTM Operating System v11.5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation
Applied evaluation methodology for anti-virus software. EICAR Conference 2009
Applied evaluation methodology for anti-virus software Jean-Baptiste Bédrune Sogeti / ESEC R&D jean-baptiste.bedrune(at)sogeti.com Alexandre Gazet Sogeti / ESEC R&D alexandre.gazet(at)sogeti.com EICAR
The Software Process. The Unified Process (Cont.) The Unified Process (Cont.)
The Software Process Xiaojun Qi 1 The Unified Process Until recently, three of the most successful object-oriented methodologies were Booch smethod Jacobson s Objectory Rumbaugh s OMT (Object Modeling
A Review on Cloud Computing Vulnerabilities
A Review on Cloud Computing Vulnerabilities Ms. Sugandha Nandedkar, Ms.Sangeeta Kakarwal Asst.Prof., Department of Computer Science and Engineering, DIEMS /Dr. BAMU, Aurangabad, MH, India. Prof. and HOD,
A Tool for Enterprise Architecture Analysis using the PRM formalism
A Tool for Enterprise Architecture Analysis using the PRM formalism Markus Buschle, Johan Ullberg, Ulrik Franke, Robert Lagerström, and Teodor Sommestad Industrial Information and Control Systems, KTH
CIP-010-2 Cyber Security Configuration Change Management and Vulnerability Assessments
CIP-010-2 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)
It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The
Certification Report
Certification Report EAL 3+ Evaluation of Rapid7 Nexpose Vulnerability Management and Penetration Testing System V5.1 Issued by: Communications Security Establishment Canada Certification Body Canadian
MEng, BSc Computer Science with Artificial Intelligence
School of Computing FACULTY OF ENGINEERING MEng, BSc Computer Science with Artificial Intelligence Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give
Qlik UKI Consulting Services Catalogue
Qlik UKI Consulting Services Catalogue The key to a successful Qlik project lies in the right people, the right skills, and the right activities in the right order www.qlik.co.uk Table of Contents Introduction
Victor Shoup Avi Rubin. fshoup,[email protected]. Abstract
Session Key Distribution Using Smart Cards Victor Shoup Avi Rubin Bellcore, 445 South St., Morristown, NJ 07960 fshoup,[email protected] Abstract In this paper, we investigate a method by which smart
The Benefits of an Integrated Approach to Security in the Cloud
The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The
INTERNATIONAL STANDARD ON ASSURANCE ENGAGEMENTS 3000 ASSURANCE ENGAGEMENTS OTHER THAN AUDITS OR REVIEWS OF HISTORICAL FINANCIAL INFORMATION CONTENTS
INTERNATIONAL STANDARD ON ASSURANCE ENGAGEMENTS 3000 ASSURANCE ENGAGEMENTS OTHER THAN AUDITS OR REVIEWS OF HISTORICAL FINANCIAL INFORMATION (Effective for assurance reports dated on or after January 1,
Evaluation of Students' Modeling and Programming Skills
Evaluation of Students' Modeling and Programming Skills Birgit Demuth, Sebastian Götz, Harry Sneed, and Uwe Schmidt Technische Universität Dresden Faculty of Computer Science Abstract. In winter semester
Near Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
KEY FACTORS AND BARRIERS OF BUSINESS INTELLIGENCE IMPLEMENTATION
KEY FACTORS AND BARRIERS OF BUSINESS INTELLIGENCE IMPLEMENTATION Peter Mesároš, Štefan Čarnický & Tomáš Mandičák The business environment is constantly changing and becoming more complex and difficult.
Fingerprint Spoof Detection Protection Profile
Fingerprint Spoof Detection Protection Profile based on Organisational Security Policies FSDPP_OSP v1.7 Bundesamt für Sicherheit in der Informationstechnik Postfach 20 03 63 53133 Bonn Tel.: +49 228 99
Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 1.2.1 to 2.0
Payment Card Industry (PCI) Data Security Standard Summary of s from PCI DSS Version 1.2.1 to 2.0 October 2010 General General Throughout Removed specific references to the Glossary as references are generally
Supporting Document Guidance. Security Architecture requirements (ADV_ARC) for smart cards and similar devices. April 2012. Version 2.
Supporting Document Guidance Security Architecture requirements (ADV_ARC) for smart cards and similar devices April 2012 Version 2.0 CCDB-2012-04-003 Foreword This is a supporting document, intended to
- Table of Contents -
- Table of Contents - 1 INTRODUCTION... 1 1.1 TARGET READERS OF THIS DOCUMENT... 1 1.2 ORGANIZATION OF THIS DOCUMENT... 2 1.3 COMMON CRITERIA STANDARDS DOCUMENTS... 3 1.4 TERMS AND DEFINITIONS... 4 2 OVERVIEW
