Trusted Computer System Evaluation Criteria
GPTKB entity
Statements (52)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:psychology
|
gptkbp:applies_to |
gptkb:computer
|
gptkbp:class |
Verified Design
|
gptkbp:class_b |
Mandatory Access Control
|
gptkbp:class_c |
Discretionary Access Control
|
gptkbp:class_d |
Minimal Security
|
gptkbp:classifies_systems_as |
A, B, C, D
|
gptkbp:consists_of |
four classes of security
|
gptkbp:developed_by |
gptkb:United_States_Department_of_Defense
|
gptkbp:focuses_on |
security features
|
https://www.w3.org/2000/01/rdf-schema#label |
Trusted Computer System Evaluation Criteria
|
gptkbp:includes |
testing requirements
documentation requirements evaluation requirements |
gptkbp:influenced |
gptkb:ISO/_IEC_15408
|
gptkbp:is_adopted_by |
gptkb:private_sector
international organizations |
gptkbp:is_based_on |
security policies
security models |
gptkbp:is_criticized_for |
complexity
lack Of Flexibility limited Scope outdated Criteria subjectivity In Evaluation |
gptkbp:is_documented_in |
Do D 5200.28-STD
Do D Trusted Computer System Evaluation Criteria |
gptkbp:is_evaluated_by |
independent evaluators
third-party evaluators government evaluators |
gptkbp:is_influenced_by |
Bell-La Padula model
Biba model Clark-Wilson model |
gptkbp:is_part_of |
Department of Defense Trusted Computer System Evaluation Program
|
gptkbp:is_related_to |
access control
risk management data confidentiality computer security system integrity information assurance security certification |
gptkbp:is_used_in |
security assessments
system accreditation |
gptkbp:known_as |
gptkb:TCSEC
|
gptkbp:provides_guidance_on |
evaluators
system developers accreditors |
gptkbp:published_in |
gptkb:1983
|
gptkbp:purpose |
to provide a standard for evaluating the security of computer systems
|
gptkbp:replaced_by |
gptkb:Common_Criteria
|
gptkbp:used_by |
government agencies
|
gptkbp:bfsParent |
gptkb:The_Orange_Book
|
gptkbp:bfsLayer |
5
|