P. 1
NCSC-TG-022 a Guide to Trusted Recovery in Trusted Systems

NCSC-TG-022 a Guide to Trusted Recovery in Trusted Systems

Ratings: (0)|Views: 8|Likes:
Published by Robert Vale
NCSC Rainbow Series book
NCSC Rainbow Series book

More info:

Published by: Robert Vale on Aug 29, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

11/11/2014

pdf

text

original

 
AD-A
25
1
732
NCSC-TG-022
VERSION
1
NATIONAI
/-
,-x'A
NATIONAL
COMPUTER
SECURITY
CENTER
T
IC
TC
JUNi
5
1992
AGUIDE
TO
C
UNDERSTANDING
TRUSTED
RECOVERY
IN
TRUSTED
SYSTEMS
92-15334
30
December
1991
ApprovedforPublicRelease:DistributionUnlimited
92
(-
!"
 
NCSC-TG-022
Library
No.
S-236,061
Version
1
FOREWORD
A
Guide to
Understanding
Trusted
Recovery
in
TrustedSystems
provides
a
set
of
good practicesrelated
to
trusted
recovery.
We
havewritten
this
guidelineto
help
the
vendor
and
evaluatorcommunity understandtherequirementsfortrusted
recovery,
as well
as
the level of detail requiredfor trusted recovery
at all
applicableclasses,
as
described
in
the
Department
of
Defense Trusted Computer
Systems
Evaluation
Criteria.
In
an
effort
to
provide
guidance,
we
make
recommendations
in
this
technical
guidelinethat
arenot
requirements
in
the
Criteria.The
Trusted
Recovery
Guide
is
the latest
in
a
series
of
technical guidelines
published
by
the
National
Computer SecurityCenter. These
publications
provideinsight to the
Trusted Computer
Systems
Evaluation
Criteria
requirementsfor
the
computer
security
vendor
and
terhnical
evaluator.
Thegoal of
the
Technical
Guideline
Program
is
to discuss
eachfeatureofthe
Criteria
in
detail
and
to providethe properinterpretations
with
specific guidance.
TheNational
ComputerSecurity Center
has
established
an
aggressive
program
to
study
and
implement
computer securitytechnology.
Our goal
is
to encourage
the
widespreadavailabilityoftrusted computer
products
for
use
by
any organizationdesiringbetterprotectionof
its
important
data.One
way
we
dothis
is
by
the TrustedProduct
Evaluation Program.
This
program
focuses
on
the security features
of
commerciallyproduced
and
supportedcomputersystems.
We
evaluate
theprotection
capabilities
againsttheestablished criteriapresented
in
the
Trusted
ComputerSystem
Evaluation
Criteria.
This program, and
an
open
and
cooperativebusiness
relationship
with
thecomputer
and
telecommunications
industries,
will
result
in
thefulfillmentof
our
country's
information
systems
security
requirements.
We
resolveto meet the
challenge
of
identifyingtrusted computerproductssuitable
for use
in
processing
information
that needsprotection.
I
invite your
suggestions
for
revising this
technical
guideline.
We
will
review
this
document
as
the need arises.
30
December
1991
Patrick
R.
Gallagher,
Jr.
eggsr
irector
ee
'o
National
ComputerSecurity
Center
,"r
gatc-
DTwtla-t-.L-_
_d
Avallab111t,
UGd.
i -a
F1d/or-
Diet
wai
 
ACKNOWLEDGMENTS
The
National
ComputerSecurity
Center
extendsspecial
recognition
and
acknowledgment
to
Dr.
Virgil
D.
Gligor
as the
primary author
of
this
document.
James
N.
Menendez
and Capt.
James
A.
Muysenberg
(USAF)
are
recognized
forthe
development
of
thisguideline,
andCapt.
Muysenberg
is
recognizedfor
its
editing
and
publication.
We
wishto
thankthe
many
members
of
the
computersecuritycommunity
who
enthusiasticallygave
theirtime
and
technical
expertise
in
reviewing
this
guideline
and
providing
valuablecomments
and
suggestions.
ii

Activity (2)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->