Add to Book Shelf
Flag as Inappropriate
Email this Book

Security Controls for Computer Systems (U)

Click here to view

Book Id: WPLBN0000661517
Format Type: PDF eBook:
File Size: 5.69 MB
Reproduction Date: 2005

Title: Security Controls for Computer Systems (U)  
Author:
Volume:
Language: English
Subject: Technology., Reference materials, Technology and literature
Collections: Techonology eBook Collection
Historic
Publication Date:
Publisher:

Citation

APA MLA Chicago

Security Controls for Computer Systems (U). (n.d.). Security Controls for Computer Systems (U). Retrieved from http://gutenberg.us/


Description
Technical Reference Publication

Excerpt
Preface: The question of security control in resource-sharing systems was brought into focus for the Department of Defense by a series of events in the spring and summer of 1967. Such systems were being procured in increasing numbers for government installations; the problems of security for them were becoming of pressing concern both to defense contractors and to military operations; the Research Security Administrators had forwarded a position paper through the Defense Supply Agency to the Director for Security Policy in the Office of Assistant Secretary of Defense (Administration) soliciting action. Since the matter involved technical issues, the paper was referred to the Office of the Director of Defense Research and Engineering for consideration. In June 1967, the Deputy Director (Administration, Evaluation and Management) requested the Director of the Advanced Research Projects Agency (ARPA) to form a Task Force to study and recommend hardware and software safeguards that would satisfactorily protect cl

Table of Contents
CONTENTS Memorandum for the Secretary of Defense . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .ii i Memorandum for Chairman. Defense Science Board . . . . . . . . . . . . . . . . . . . . . . . . v Preface ................................................................. xi Part A . NATURE OF THE PROBLEM ............................... 1 I . The Security Problem ....................................... 1 I1 . Types of Computer Systems ................................. 1 I11 . Threats to System Security .................................. 3 IV . Areas of Security Protection ................................. 5 V . System Characteristics ....... ; .............................. 10 VI . Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 2 Part B . POLICY CONSIDERATIONS AND RECOMMENDATIONS .... 14 I . Fundamental Principles ..................................... 14 I1. System Personnel ..........................................1 4 111 . Information Structure and Transforms . . . . . . . . . . . . . . . . . . . . . . .1 7 IV . System Transaction Accounting ..............................1 8 V . Reliability and Auto-Testing .................................1 9 VI. Information Security Labels .................................2 1 VII . Management of Storage Resources . . . . . . . . . . . . . . . . . . . . . . . . . . .2 1 VIII . System Certification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.2 Part C . I . I1 . I11 . IV . v . VI . VII . VIII . IX . X . TECHNICAL RECOMMENDATIONS . . . . . . . . . . . . . . . . . . . . . . . .2 6 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.6 Central Processor Hardware .................................2 7 Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.9 Access Control Throughout the System . . . . . . . . . . . . . . . . . . . . . . .3 1 Communication Lines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.8 Terminals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3.8 Certification ................................................3 9 Open Environment Considerations ........................... 42 Research Needed ...........................................4 3 Overall System Problems .....................................4 3

 
 



Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.