menu
{ "item_title" : "Computer Security for ASSIST", "item_author" : [" Martin H. Beach "], "item_description" : "This thesis examines the multilevel security problem of simultaneous processing of compartmented and collateral data at the Intelligence Data Handling Site, Forces Command Intelligence Group, Fort Bragg, North Carolina. Existing security controls are examined, and a list of software controls are discussed to reduce the risk of penetration, whether accidental or deliberate. Software controls are described in four major areas: access controls, input/output controls, residual controls, and audit trail controls. The security kernel is discussed as the heart of all software controls. A method of verifying the software is discussed and a procedure is explained for certifying the ASSIST system as possessing an acceptable security risk. Recommendations are described to reduce the risk of penetration and certify the system as secure through software controls.", "item_img_path" : "https://covers2.booksamillion.com/covers/bam/1/24/936/480/1249364809_b.jpg", "price_data" : { "retail_price" : "57.95", "online_price" : "57.95", "our_price" : "57.95", "club_price" : "57.95", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Computer Security for ASSIST|Martin H. Beach

Computer Security for ASSIST

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

This thesis examines the multilevel security problem of simultaneous processing of compartmented and collateral data at the Intelligence Data Handling Site, Forces Command Intelligence Group, Fort Bragg, North Carolina. Existing security controls are examined, and a list of software controls are discussed to reduce the risk of penetration, whether accidental or deliberate. Software controls are described in four major areas: access controls, input/output controls, residual controls, and audit trail controls. The security kernel is discussed as the heart of all software controls. A method of verifying the software is discussed and a procedure is explained for certifying the ASSIST system as possessing an acceptable security risk. Recommendations are described to reduce the risk of penetration and certify the system as secure through software controls.

This item is Non-Returnable

Details

  • ISBN-13: 9781249364801
  • ISBN-10: 1249364809
  • Publisher: Biblioscholar
  • Publish Date: September 2012
  • Dimensions: 9.69 x 7.44 x 0.12 inches
  • Shipping Weight: 0.28 pounds
  • Page Count: 60

Related Categories

You May Also Like...

    1

BAM Customer Reviews