Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
2Activity
0 of .
Results for:
No results containing your search query
P. 1
NCSC-TG-030-V1 A Guide To Understanding Covert Channel Analysis in Trusted Systems (Light Pink Book)

NCSC-TG-030-V1 A Guide To Understanding Covert Channel Analysis in Trusted Systems (Light Pink Book)

Ratings: (0)|Views: 19 |Likes:
Published by Robert Vale
Book 30 of the Rainbow Series
Book 30 of the Rainbow Series

More info:

Published by: Robert Vale on Jan 11, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

01/04/2014

pdf

text

original

 
NCSC-TG-w$
VERSION
1
NATIONAL
COMPUTER
SECURITY
CENTER
MAR
9
14
R.ASREFERENCEC.
A
GUIDE
TO
UNDERSTANDING
COVERT
CHANNEL
ANALYSIS
OF
TRUSTED
SYSTEMS
20080226281
November1993
Approved
for
Public
Release:
DistributionUnlimited
 
NCSC-TG-030
Library
No.
S-240,572
Version
1
FOREWORD
A
Guide
to
Understanding
Covert
ChannelAnalysis
of
TrustedSystems
provides
a
set
of
good
practices
related
tocovert
channel
analysis.
We
havewrittenthis
guide
to
helpthe
vendor
andevaluatorcommunitiesunderstandtherequirementsfor
covert
channelanalysisas
described
in
the
Department
of
Defense
Trusted
ComputerSystem
Evaluation
Criteria
(TCSEC).
In
an
effortto
provideguidance,
wemake
recommendations
in
this technical
guidethatarenot
cited
in
the
TCSEC.
Thisguide
is
thelatest
in a
series
of
technical
guidelines
published
by
theNationalComputerSecurityCenter.
Thesepublicationsprovideinsightto
the
TCSEC
require-mentsforthe
computersecurityvendor
and
technical
evaluator.The
goals
of
the
Technical
Guideline
Programare
todiscuss
eachfeature
of
the
TCSEC
in
detail
and
toprovidetheproper
interpretations
with
specificguidance.
TheNational
ComputerSecurityCenter
has
established
an
aggressive
programtostudy
and
implement
computersecurity
technology.
Ourgoal
is
toencourage
the
widespread
availabilityof
trusted
computer
products
foruse
by
anyorganizationdesiringbetterprotectionofits important
data.One
way
we
do
this
is
by
supportingtheTrustedProduct
EvaluationProgram.
Thisprogram
focuses
on
the
security
fea-
tures
of
commerciallyproduced
and
supported
computersystems.
We
evaluatetheprotection
capabilitiesagainstthe
established
criteriapresented
in
the
TCSEC.
Thisprogram,and
an
open
and
cooperative
business
relationship
with
the
computer
and
telecommunicationsindustries,
will
result
in
the
fulfillment
ofour
country's
informa-tion
systemssecurityrequirements.
We
resolve
to
meetthe
challenge
ofidentifyingtrusted
computerproductssuitable
for
use
in
processing
informationthatrequiresprotection.
I
inviteyour
suggestions
forrevising
thistechnicalguide.
Wewill
reviewthisdocu-
mentas
theneedarises.Patrick
R.
(
gher,
6K
7
November
1993
Director
National
ComputerSecurityCenter
 
ACKNOWLEDGMENTS
TheNationalComputerSecurity
Center
(NCSC)
extends
specialrecognition
and
acknowledgmentto
Virgil
D.
Gligor
as
primaryauthor
and
preparerof
thisdocument,toJonathan
K.
Millen
for
providing
significanttechnical
inputfor
the
covert
channel
identification
and
bandwidthestimation
sections,
andtothe
firstcovert
channelworkinggroup
of
the
NCSC
(which
metfrom
1989
to
1991)
for
providingmost
of
the
material
presented
in
Appendices
A
and
B.
Capt.
James
K.
Goldston
(USAF)
and
Capt.
James
A.
Muysenberg
(USAF)
are
recognized
forthe
development,
editing,
and
publication
of
thisguide.
We
wishto thankthe
many
membersofthe computer
security
community
who
enthusiastically
gave
their
time
and
technicalexpertise
in
reviewingthisguide
and
providingvaluablecomments
and
suggestions.

Activity (2)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->