Information Security - Seven: Trusted Computer System Evaluation Guidelines

xiaoxiao2021-03-06  118

Trusted computer system evaluation criterion

In 1983, the US Department of Defense announced the "Trusted Computer System Evaluation criteria" TCSec (Trusted Computer System Evaluation criteria), and the security credibility of the computer system is from D, C, B, and A four categories. Level: D, C1, C2, B1, B2, B3, A1.

(Minimal Protection) D: This level of computer system does not have any safety measures in addition to physical security facilities, and anyone can access the system resources and data as long as the system can access the system, such as DOS, Windows low version and DBASE are this A class (referring to a system that does not meet the safety requirements, sensitive information cannot be handled in a multi-user environment).

(Autonomous Protection Class) C1: With an autonomous access control mechanism, identification is required when you log in.

(Autonomous Protection Class) C2: With audit and verification mechanisms ((TCB) trusted computer bases for establishing and maintenance, prevent external personnel from modifying). Most of the systems such as multi-user Unix and Oracle have many security facilities.

(Forced Safety Protection) B1 Level: Introducing Forced Access Control Mechanism, it is possible to manage the main and object security tags.

B2 level: formulated safety model, emphasizing the means of actual evaluation, can limit the hidden channel. (Mainly for storage hidden channels)

B3: Safety domain separation measures for hardware support to ensure integrity of software and hardware in the security domain, providing trusted channels. Restrictions on time hidden channels.

A1: Requirements to the formalization of safety models, formalized analysis of hidden channels, has a reliable distribution installation process.

(Its safety function, the front is included in turn)

Trusted Oracle 7 has passed the B1 level test.

In addition to TCSEC, the corresponding "Trusted Network Description" (TNI) and "Trusted Database Description" (TDI) have proposed the above two systems.

转载请注明原文地址:https://www.9cbs.com/read-102247.html

New Post(0)