Page 89 - DCAP516_COMPUTER_SECURITY
P. 89

Unit 7: Designing Trusted Operating System




          possible – it is very difficult), and formal validation by an outside vendor. The author of these  Notes
          notes had been part of a software V&V (verification and validation) team, assigned to be sure
          that the code was written correctly and that it adhered to the requirements.
          It is based on factors such as:
          1.   Software architecture : E.g., kernelized design,
          2.   Development process : Who developed it

          3.   Technical assessment
          There are various methods for providing assurance in operating system. These have been
          discussed briefly below:

          1.   Testing: Testing method can demonstrate existence of flaw, not absence
          2.   Formal Specification and Verification: It is a time-consuming, painstaking process
          3.   Validation Process: This process involves requirements checking, design and code reviews,
               module and system testing
          4.   Configuration Management and Trusted System Distribution: It improve assurance in the
               development/deployment cycle.

          7.7.1 Assurance Criteria


          Assurance criteria are specified to enable evaluation. It was originally motivated by military
          applications, but now is much wider.


                 Examples:
            1.   Orange Book (Trusted Computer System Evaluation Criteria)
            2.   Common Criteria

          Trusted Computer System Evaluation Criteria (TCSEC)

          It is a United States Government Department of Defense (DoD) standard that sets basic
          requirements for assessing the effectiveness of computer security controls built into a computer
          system. The TCSEC was used to evaluate, classify and select computer systems being considered
          for the processing, storage and retrieval of sensitive or classified information.
          The TCSEC, frequently referred to as the Orange Book, is the centerpiece of the DoD Rainbow
          Series publications. Initially issued in 1983 by the National Computer Security Center (NCSC),
          an arm of the National Security Agency, and then updated in 1985, TCSEC was replaced by the
          Common Criteria international standard originally published in 2005.

          Fundamental Objectives and Requirements

          The Orange Book or DoDD 5200.28-STD was canceled by DoDD 8500.1 on October 24, 2002.

          Policy

          The security policy must be explicit, well-defined and enforced by the computer system. There
          are two basic security policies:






                                           LOVELY PROFESSIONAL UNIVERSITY                                   83
   84   85   86   87   88   89   90   91   92   93   94