Foundations for the Harmonization of Information Technology Security Standards

ثبت نشده
چکیده

This paper is the first work product of Joint Task 1 (JT01) defined in the Joint Workplan for cooperation on Security of Information Systems [1]. The objectives of JT01 are to: (a) Establish a common set of security functionality classes, representative of international and regional market-driven needs. (b) Develop a common approach to the creation of profiles from these security functionality classes consistent with current regional and international activities. (c) Create guidelines to support the prototyping of such profiles and their interpretability. This paper provides a base for common understanding of critical terms and concepts. It discusses the efforts and terms used in the four major Information Technology Security efforts: (a) The U. S . Department of Defense Trusted Computer System Evaluation Criteria (TCSEC) [2], also known as the Orange Book. (b) The Information Technology Security Evaluation Criteria (ITSEC) [3]. (c) The Canadian Trusted Computer Product Evaluation Criteria (CTCPEC) [4]. (d) Federal Criteria for Information Technology Security [5]. In addition, this paper looks at the terms and concepts used in the development of International Standards Organization (ISO) standards for Open Systems Interconnection (OSI). This paper is presented as a base for the JT01 work and is not intended to analyze the good or weakness of various approaches to defining functionality classes or profiles. It attempts to point out where there are differences or the terminology is not precise to allow for a common international acceptance.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry

Providing security in the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both te...

متن کامل

Towards an Integrated Management System (IMS), harmonizing the ISO/IEC 27001 and ISO/IEC 20000-2 Standards

In recent times, and in order to maintain an integrated, efficient and homogeneous policy, Integrated Management Systems (IMS) have emerged as an opportunity to improve processes related to Information Technology (IT) in organizations in a way that is modular, consistent and orderly. The ISO 27001 and ISO 20000 standards provide good practices for creating and/or strengthening management infras...

متن کامل

Foundations of a Metadata Repository for Databases of Registers and Trials

The planning of case report forms (CRFs) in clinical trials or databases in registers is mostly an informal process starting from scratch involving domain experts, biometricians, and documentation specialists. The Telematikplattform für Medizinische Forschungsnetze, an umbrella organization for medical research in Germany, aims at supporting and improving this process with a metadata repository...

متن کامل

Criteria for Prescribing Coercion in case of Gross and Widespread Violation of the Ethical Foundations of Human Rights

Background: Observance of human rights standards and adherence to ethical principles and foundations prevents the vulnerability of governments to foreign decisions and guarantees the independence of countries in a world where interdependence is one of its characteristics. Governments, while having legal legitimacy, must also enjoy moral legitimacy. Otherwise, international organizations and oth...

متن کامل

Information Security Requirements for Implementing Electronic Health Records in Iran

Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013