• The Common Criteria for Information Technology Security Evaluation (referred to as Common Criteria or CC) is an international standard (ISO/IEC 15408)...
    30 KB (3,714 words) - 13:04, 24 July 2024
  • Thumbnail for Trusted Computer System Evaluation Criteria
    Orange book was replaced by the International Common Criteria for Information Technology Security Evaluation. On 24 October 2002, The Orange Book (aka DoDD...
    18 KB (2,101 words) - 21:38, 25 February 2024
  • Common Criteria for Information Technology Security Evaluation, version 3.1 Part 1 (called CC 3.1 or CC) defines the Security Target (ST) as an...
    5 KB (663 words) - 08:18, 1 March 2024
  • implementation, and post-evaluation. Pre-evaluation: to identify the awareness of information security within employees and to analyze current security policy Strategic...
    191 KB (22,160 words) - 04:48, 14 August 2024
  • Thumbnail for Common Criteria Evaluation and Validation Scheme
    Assurance Partnership (NIAP) to evaluate security functionality of an information technology with conformance to the Common Criteria international standard. The...
    4 KB (452 words) - 16:44, 14 November 2023
  • international standard for computer security certification, referred to as the Common Criteria for Information Technology Security Evaluation (ISO/IEC 15408)...
    8 KB (834 words) - 20:44, 18 January 2022
  • The Information Technology Security Evaluation Criteria (ITSEC) is a structured set of criteria for evaluating computer security within products and systems...
    4 KB (414 words) - 23:32, 19 May 2024
  • Security information and event management (SIEM) is a field within the field of computer security, where software products and services combine security...
    35 KB (4,093 words) - 02:18, 27 July 2024
  • Thumbnail for Risk
    Risk (redirect from Risk criteria)
    (business, economics, environment, finance, information technology, health, insurance, safety, security etc). This article provides links to more detailed...
    86 KB (10,467 words) - 12:13, 10 August 2024
  • Thumbnail for Computer security
    Computer security (also cybersecurity, digital security, or information technology (IT) security) is the protection of computer software, systems and...
    219 KB (22,182 words) - 19:16, 14 August 2024
  • Scheme Publication #4 Common Criteria Evaluation and Validation Scheme for Information Technology Security — Guidance to Common Criteria Testing Laboratories...
    7 KB (839 words) - 03:02, 26 April 2022
  • Separation kernel (category All articles with bare URLs for citations)
    High Robustness," Version 1.03, June 2007. "Common Criteria for Information Technology Security Evaluation," Version 3.1, CCMB-2006-09-001, 002, 003, September...
    6 KB (858 words) - 14:31, 15 August 2022
  • Thumbnail for FreeBSD
    FreeBSD (section Security)
    the goal of implementing concepts from the Common Criteria for Information Technology Security Evaluation and the Orange Book. This project is ongoing[timeframe...
    107 KB (7,908 words) - 00:38, 8 August 2024
  • In common usage, evaluation is a systematic determination and assessment of a subject's merit, worth and significance, using criteria governed by a set...
    43 KB (4,502 words) - 07:16, 19 April 2024
  • Thumbnail for Printer Working Group
    Printer Working Group (category Information technology organizations)
    "Imaging Device Security workgroup". Printer Working Group. "Common Criteria for Information Technology Security Evaluation (CC)". Common Criteria Portal. "Hardcopy...
    6 KB (680 words) - 17:26, 8 August 2023
  • Thumbnail for Hardware security module
    level of FIPS 140 security certification attainable is Security Level 4, most of the HSMs have Level 3 certification. In the Common Criteria system the highest...
    14 KB (1,564 words) - 02:37, 4 August 2024
  • Application Security Project (OWASP) is an online community that produces freely available articles, methodologies, documentation, tools, and technologies in the...
    16 KB (1,343 words) - 09:29, 15 August 2024
  • Thumbnail for IT risk management
    the certification of a product. Criteria include the risk evaluation, risk acceptance and impact evaluation criteria. These are conditioned by: legal...
    55 KB (5,953 words) - 00:04, 21 July 2024
  • sociotechnical perspective, information systems comprise four components: task, people, structure (or roles), and technology. Information systems can be defined...
    50 KB (5,871 words) - 04:55, 13 August 2024
  • "security clearance" is also sometimes used in private organizations that have a formal process to vet employees for access to sensitive information....
    52 KB (5,570 words) - 16:28, 6 August 2024
  • use of evaluated IT products and systems Champion the development and use of national and international standards for IT security Common Criteria Foster...
    4 KB (486 words) - 22:37, 16 December 2021
  • for security professionals involved in evaluating compliance with ISO/IEC 15408 (Information technologySecurity techniques—Evaluation criteria for IT...
    57 KB (7,425 words) - 01:51, 15 June 2024
  • maintenance of security metrics, security evaluation criteria and evaluation methodologies, tests and test methods; security-specific criteria for laboratory...
    16 KB (1,902 words) - 15:20, 10 January 2024
  • platform. This was evaluated against the DoD Computer Security Center Orange Book evaluation criteria at level A1. The RSRE Secure User Environment (SUE)...
    11 KB (1,189 words) - 01:09, 11 December 2023
  • Thumbnail for Communications Security Establishment
    responsible for foreign signals intelligence (SIGINT) and communications security (COMSEC), protecting federal government electronic information and communication...
    54 KB (5,118 words) - 15:17, 17 July 2024
  • Thumbnail for Rainbow Series
    Rainbow Series (category Computer security standards)
    technology using this process as part of their procurement criteria. Many of these standards have influenced, and have been superseded by, the Common...
    13 KB (268 words) - 20:41, 14 July 2024
  • Mandatory access control (category Computer security models)
    multilevel security (MLS) as a means of protecting classified information of the United States. The Trusted Computer System Evaluation Criteria (TCSEC),...
    21 KB (2,427 words) - 06:36, 28 June 2024
  • burgeoning variety of text forms associated with information and multimedia technologies. Evaluation consists of several component processes including...
    75 KB (8,551 words) - 06:57, 16 August 2024
  • Thumbnail for Geographic information system
    organizations. The uncounted plural, geographic information systems, also abbreviated GIS, is the most common term for the industry and profession concerned with...
    101 KB (13,112 words) - 06:30, 12 August 2024
  • "Important Project of Common European Interest" (IPCEI) and includes innovation in microelectronics and communication technologies. In April 2013, the EU...
    10 KB (933 words) - 07:53, 8 October 2023