Page 92 - DCAP516_COMPUTER_SECURITY
P. 92

Computer Security




                    Notes          7.8 Summary

                                       A trusted system connotes one that meets the intended security requirements, is of high
                                       enough quality, and justifies the user’s confidence in that quality. That is , trust is perceived
                                       by the system’s receiver or user, not by its developer, designer, or manufacturer. It is
                                       important to realize that there can be degrees of trust; unlike security, trust is not a
                                       dichotomy.
                                       A trusted Operating System is one that provides the following facilities in a consistent and
                                       effective way
                                            Memory protection
                                            File protection

                                            General object access control
                                            User authentication
                                       Assurance criteria are specified to enable evaluation. It was originally motivated by military
                                       applications, but now is much wider.  Common examples are Orange Book (Trusted
                                       Computer System Evaluation Criteria) and Common Criteria.
                                       Common Criteria or CC is an international standard (ISO/IEC 15408) for computer security
                                       certification. It is currently in version 3.1. Common Criteria is a framework in which
                                       computer system users can specify their security functional and assurance requirements,
                                       vendors can then implement and/or make claims about the security attributes of their
                                       products, and testing laboratories can evaluate the products to determine if they actually
                                       meet the claims.

                                   7.9 Keywords

                                   Audit Policy: The audit policy should specify what events are to be logged for later analysis.
                                   Trusted System: A trusted system connotes one that meets the intended security requirements,
                                   is of high enough quality, and justifies the user’s confidence in that quality.

                                   7.10 Review Questions

                                   1.  What do you mean by a trusted system?
                                   2.  What are trusted operating system?

                                   3.  Explain the various security features of a trusted operating system.
                                   4.  Discuss, “Assurance in trusted operating system”.
                                   5.  Write short notes on the following:
                                       (a)  Trusted Computing Base
                                       (b)  Kernalized base

                                       (c)  Orange Book

                                   Answers: Self Assessment

                                   1.  True                              2.   True
                                   3.  False                             4.   False



          86                                LOVELY PROFESSIONAL UNIVERSITY
   87   88   89   90   91   92   93   94   95   96   97