This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Computer system evaluation  and security

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Computer system evaluation  and security

Qsn1.

Answer C-Four

The trusted computer system evaluation criterion is divided into four classifications. The four classifications represent significant differences in which trust an individual or company can place on the evaluated system (Rouse, 2019).

Qsn2.

Answer A-ITSEC ratings are not mapped to the orange book.

The ITSEC offers significant flexibility compared to TCSEC (Stewart, Chapple, and Gibson, 2012). it contains arrangements principle of the technology security evaluation and is a piece of the United States defense team.

Qsn3.

Answer A-Option A

The TCSEC is designed standards that focus on setting basic requirements to assess the effectiveness of computer controls (Rouse, 2019). The orange book recognizes the affirmation importance of the PC tasks security that guarantees TCB security arrangements.

Qsn4.

Answer A-The Red book

The red book is known as the Trusted Network Interpretation and contains security for system parts.

Qsn5.

Answer D- the TCSEC is divided into four divisions, D, C, B, and A. the D division offers the minimum security and is reserved for a system that has evaluated but does bit meet the requirement for the high divisions (Stewart, Chapple, and Gibson, 2012).

Qsn6.

Answer D-Common criteria

The ISO 15408 comprises of general concepts and principles of Information Security evaluation and specifies the overall model evaluation to be given to different parts of the ISO 15408 (Stewart, Chapple, and Gibson, 2012). The common criteria used to ensure all certified products meet the security standards deployed.

Qsn7.

Answer C-Structured protection

The B2 security system majorly focuses on implementing B1 security measures by extending discretionary and mandatory access to various control features to all objects in the data processing or computing solution (Rouse, 2019).  The B2 security system requires all systems to have formal security policies that will help in addressing all object access and handling procedures.

Qsn8.

Answer D-EAL 7

The EAL 7 ensures products have been tested and meets the required standards. It also provides all products that are formally verified, designed, and tested.

Qsn9.

Answer B- Trusted Computer System Evaluation Criteria (TCSEC)

The TCSEC defines four security divisions, where A provides the highest security. Each of the division offers significant differences whereby an individual can be evaluated (Stewart, Chapple, and Gibson, 2012).

Qsn10.

Answer B-product test results

A common criterion is a framework that computer systems rely on specifying their functional security requirements and functional assurances (Rouse, 2019). It provides the EAL with an appraisal that expresses the dimension of testing that has been done.  It helps computer users in ensuring they the required security.

 

References

Rouse, (M). (2019). Evaluation Assurance Level (EAL). Retrieved from https://searchdatacenter.techtarget.com/definition/Evaluation-Assurance-Level-EAL

Stewart, J. M., Chapple, M., & Gibson, D. (2012). CISSP: Certified Information Systems Security Professional Study Guide. John Wiley & Sons.

 

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask