Computer system evaluation and security
Qsn1.
Answer C-Four
The trusted computer system evaluation criterion is divided into four classifications. The four classifications represent significant differences in which trust an individual or company can place on the evaluated system (Rouse, 2019).
Qsn2.
Answer A-ITSEC ratings are not mapped to the orange book.
The ITSEC offers significant flexibility compared to TCSEC (Stewart, Chapple, and Gibson, 2012). it contains arrangements principle of the technology security evaluation and is a piece of the United States defense team.
Qsn3.
Answer A-Option A
The TCSEC is designed standards that focus on setting basic requirements to assess the effectiveness of computer controls (Rouse, 2019). The orange book recognizes the affirmation importance of the PC tasks security that guarantees TCB security arrangements.
Qsn4.
Answer A-The Red book
The red book is known as the Trusted Network Interpretation and contains security for system parts.
Qsn5.
Answer D- the TCSEC is divided into four divisions, D, C, B, and A. the D division offers the minimum security and is reserved for a system that has evaluated but does bit meet the requirement for the high divisions (Stewart, Chapple, and Gibson, 2012).
Qsn6.
Answer D-Common criteria
The ISO 15408 comprises of general concepts and principles of Information Security evaluation and specifies the overall model evaluation to be given to different parts of the ISO 15408 (Stewart, Chapple, and Gibson, 2012). The common criteria used to ensure all certified products meet the security standards deployed.
Qsn7.
Answer C-Structured protection
The B2 security system majorly focuses on implementing B1 security measures by extending discretionary and mandatory access to various control features to all objects in the data processing or computing solution (Rouse, 2019). The B2 security system requires all systems to have formal security policies that will help in addressing all object access and handling procedures.
Qsn8.
Answer D-EAL 7
The EAL 7 ensures products have been tested and meets the required standards. It also provides all products that are formally verified, designed, and tested.
Qsn9.
Answer B- Trusted Computer System Evaluation Criteria (TCSEC)
The TCSEC defines four security divisions, where A provides the highest security. Each of the division offers significant differences whereby an individual can be evaluated (Stewart, Chapple, and Gibson, 2012).
Qsn10.
Answer B-product test results
A common criterion is a framework that computer systems rely on specifying their functional security requirements and functional assurances (Rouse, 2019). It provides the EAL with an appraisal that expresses the dimension of testing that has been done. It helps computer users in ensuring they the required security.
References
Rouse, (M). (2019). Evaluation Assurance Level (EAL). Retrieved from https://searchdatacenter.techtarget.com/definition/Evaluation-Assurance-Level-EAL
Stewart, J. M., Chapple, M., & Gibson, D. (2012). CISSP: Certified Information Systems Security Professional Study Guide. John Wiley & Sons.