Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
2Activity
0 of .
Results for:
No results containing your search query
P. 1
NCSC-TG-019-V1 Trusted Product Evaluation Questionnaire

NCSC-TG-019-V1 Trusted Product Evaluation Questionnaire

Ratings: (0)|Views: 10|Likes:
Published by Robert Vale
Book 19, Vol.1 of the Rainbow Series
Book 19, Vol.1 of the Rainbow Series

More info:

Published by: Robert Vale on Jan 11, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

12/31/2014

pdf

text

original

 
00CD0
r'3
0)
CA)
 
NCSC-TG-019
Library
No.
S-232,458
FOREWORD
The
Trusted
Product Evaluation
Questionnaire
is
the
latest
in
a
series
of
technical
documents
that
are
being published
by
the
National
Computer
Security
Center
under
the
Technical
Guidelines
Programs.
It
is
the
goal
of
the
Technical
Guidelines
Program
to
assure
that
each
process
in
the
Trusted
Product Evaluation
Program
and
the
features
of
the
Department
of
Defense Trusted
Computer
Systems
Evaluation
Criteria
will
be
discussed
in
detail
and
provide
the
proper
interpretations
with
specific
guidance.
These
publications
are
designed
to
provide
insightto
the
Department
of
Defense Trusted
Computer
Systems
Evaluation Criteria
requirements
for
the
computer
security
vendor
and
developer,
as
well
as
the
technical
evaluator.
The
specific
questions
in
the
Trusted
Product Evaluation
Questionnaire
provide
a
set
of
good
practices
related
to
necessary
system
security
and
system
security
documentation.
This
questionnaire
has
been
written
to
help
thevendor
understand
what
technical
information
is
requiredconcerning
the
system
for
a
product
evaluation.
From
the vendor's
responses,
the
evaluator
may
obtain
an
understanding
of
the
security
of
the
system
applying
for
evaluation.
As
the
Director,National Computer
Security
Center,
I
invite
your
recommendations
for
revision
to
this
technical
guideline.
We
plan
to
review
this documentwhenthe
need
arises.
Patrick R.
Galla5her,
Jr.
17
16
October
1989
Director
National
Computer
SecurityCenter
257-937
0
-
90
-
I
(QL
3)
 
ACKNOWLEDGMENTS
The
National
Computer
Security
Center
extends
special
recognition
to
Santosh
Chokhani,
Ph.D.
and
Harriet
Goldman
as
the
primary
authors
of
thisdocument,
and
to
MAJ
James
P.
Gordon
(US
Army)
and
LT
Patricia
R.
Toth
(US
Navy)
for
the
development
and
publication
of
this
guideline.
We
wish
to
thankthe
manymembers
of
the
computer
security
community,
who
enthusiastically
gave
oftheir
time
and
technicalexpertise
in
reviewing
this
questionnaire
and
providing
valuable
comments
and
suggestions.
ii

Activity (2)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->