A Guide to Procurement of Trusted Systems

A Guide to Procurement of Trusted Systems
Author: Melvin L. DeVilbiss
Publisher:
Total Pages: 60
Release: 1998-12-01
Genre:
ISBN: 9780788174490

Will help facilitate the acquisition of trusted computer systems in accordance with DoD Trusted Computer System Evaluation Criteria. Designed for new or experienced automated information system developers, purchasers, or program managers who must identify and satisfy requirements associated with security-relevant acquisitions. Topics addressed include the procurement process, request for proposal, evaluation factors for award, nonmandatory requirements and options, evidence availability, documentation cost, interpreting the TCSEC, standard solicitation language, and descriptions, specifications, and statements of work.

A Guide to Procurement of Trusted Systems: Language for RFP Specifications and Statements of Work- An Aid to Procurement Initiators

A Guide to Procurement of Trusted Systems: Language for RFP Specifications and Statements of Work- An Aid to Procurement Initiators
Author:
Publisher:
Total Pages: 69
Release: 1993
Genre:
ISBN:

The National Security Agency (NSA) wants to clarify the computer security aspects of the Department of Defense (DoD) automated information system (AIS) acquisition process. Therefore, it is producing a four volume guideline series (referenced in Table 1-1 and more complete titles in the Bibliography). This document is the second volume. These guidelines are intended for Federal agency use in acquiring trusted systems. DoD Directive 5200.28, Security Requirements for Automated Information Systems (AISs), provides security requirements concerning all protection aspects of automated information systems. It specifies DoD 5200.28-STD, DoD Trusted Computer System Evaluation Criteria (TCSEC), as the requirement source for trusted computer systems. The second page of DoD 5200.28-STD states: 'This document is used to provide a basis for specifying security requirements in acquisition specifications'

A Guide to Procurement of Trusted Systems

A Guide to Procurement of Trusted Systems
Author: Joan Fowler
Publisher: DIANE Publishing
Total Pages: 163
Release: 1994-06
Genre:
ISBN: 0788110241

Designed for new or experienced automated information system developers, purchasers, or program managers who must identify and satisfy requirements associated with security-relevant acquisitions. Explains Contract Data Requirements Lists (CDRLs), and Data Item Description (DIDs), and their use in the acquisitions process. Charts and tables. References, glossary and acronyms.

A Guide to Procurement of Single and Connected Systems. Language for RFP Specifications and Statements of Work - An Aid to Procurement Initiators. Includes Complex, Evolving, Multipolicy Systems

A Guide to Procurement of Single and Connected Systems. Language for RFP Specifications and Statements of Work - An Aid to Procurement Initiators. Includes Complex, Evolving, Multipolicy Systems
Author:
Publisher:
Total Pages: 104
Release: 1994
Genre:
ISBN:

This technical report is a strawman update to Volume 2-4 of the procurement guideline series. The previous version was updated to deal with complex, evolving, multipolicy systems. It is written to help facilitate the acquisition of trusted computer systems in accordance with DoD 5200.28-STD, "Department of Defense Trusted Computer System Evaluation Criteria." It is designed for new or experienced automated information system developers, purchasers, or program managers who must identify and satisfy requirements associated with security-relevant acquisitions. Information contained within this series will facilitate subsequent development of procurement guidance for future national criteria. This series also includes information being developed or certification and accreditation guidance. Finally this Volume 2 document addresses the way by which Trusted Computer System Evaluation Criteria, the Trusted Network Interpretation, and the Trusted Database Management System Interpretation using a new approach called Domains of Constant Policy are translated into language for use in the Request for Proposal (RFP) Specifications and Statements of Work.

Official (ISC)2 Guide to the SSCP CBK

Official (ISC)2 Guide to the SSCP CBK
Author: Diana-Lynn Contesti
Publisher: CRC Press
Total Pages: 610
Release: 2007-04-27
Genre: Computers
ISBN: 0203331575

The SSCP certification is the key to unlocking the upper ranks of security implementation at the world's most prestigious organizations. If you're serious about becoming a leading tactician at the front lines, the (ISC) Systems Security Certified Practitioner (SSCP) certification is an absolute necessity-demanded by cutting-edge companies worldwid

Connected Systems - Language for Rfp Specifications & Statements of Work

Connected Systems - Language for Rfp Specifications & Statements of Work
Author: Howard Johnson
Publisher:
Total Pages: 95
Release: 1994-09-01
Genre: Computers
ISBN: 9780788112607

A strawman update to vol. 2 of 4 of the procurement guideline series. Deals with complex, evolving multipolicy systems. Facilitates the acquisition of trusted computer systems. Designed for new or experienced automated information system developers, purchasers, or program managers who must identify and satisfy requirements associated with security-relevant acquisitions.

Internet Security Dictionary

Internet Security Dictionary
Author: Vir V. Phoha
Publisher: Springer Science & Business Media
Total Pages: 250
Release: 2007-08-26
Genre: Computers
ISBN: 0387224475

The explosive growth of the Internet has spawned a new era of security concerns. This dictionary provides reliable definitions and descriptions of Internet security terms in clear and precise English. The dictionary covers five main areas: authentication; network- level security; firewall design and implementation, and remote management; Internet security policies, risk analysis, integration across platforms, management and auditing, mobile code security Java/Active X/scripts, and mobile agent code; and security in Internet commerce.

National Computer Security Conference, 1993 (16th) Proceedings

National Computer Security Conference, 1993 (16th) Proceedings
Author: DIANE Publishing Company
Publisher: DIANE Publishing
Total Pages: 568
Release: 1995-08
Genre:
ISBN: 9780788119248

Presentations of a conference. Covers a wide range of topics spanning the new draft Federal Criteria for Information Security, research and development activities, techniques for building secure computer systems and networks, and ethics issues. Papers and panels address harmonization of U.S. criteria for information technology security with international criteria, future techniques for integrating commercial off-the-shelf products into secure systems, access control and other networking challenges, etc. Numerous tables and figures.