Y. Sung, Eun-Kyoung Yi, Byung-Gyu No, Jae Sung Kim
{"title":"Defining requirements for network solution in protection profiles","authors":"Y. Sung, Eun-Kyoung Yi, Byung-Gyu No, Jae Sung Kim","doi":"10.1109/CCST.2003.1297581","DOIUrl":null,"url":null,"abstract":"The international standards about computer security are widely being used for both government and commercial sector. Many countries seek for their computer security at the common criteria (CC), so organizations learn more how to make protection profiles (PPs) to protect them from outside threats. However in case people make protection profiles using both \"Guide for the Production of PPs and STs\" and the common criteria, they confront some problems when defining requirements for network-wide systems instead of a single system. Many requirements in the CC are described based on a single system's activities. We found that network-wide product's PPs are required of different approach, where some statements in the CC are modified or newly extended. We show that how the network-wide targets of evaluation (TOEs) are different from a single system TOE in terms of its protection scope. This paper is of prior interest to PP/ST writers who have tasks of composing network product, or typically IDS PP/ST.","PeriodicalId":344868,"journal":{"name":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2003.1297581","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The international standards about computer security are widely being used for both government and commercial sector. Many countries seek for their computer security at the common criteria (CC), so organizations learn more how to make protection profiles (PPs) to protect them from outside threats. However in case people make protection profiles using both "Guide for the Production of PPs and STs" and the common criteria, they confront some problems when defining requirements for network-wide systems instead of a single system. Many requirements in the CC are described based on a single system's activities. We found that network-wide product's PPs are required of different approach, where some statements in the CC are modified or newly extended. We show that how the network-wide targets of evaluation (TOEs) are different from a single system TOE in terms of its protection scope. This paper is of prior interest to PP/ST writers who have tasks of composing network product, or typically IDS PP/ST.