{"title":"一种评估空军型网络安全性的方法","authors":"N. Woodfield","doi":"10.1109/CSAC.1989.81025","DOIUrl":null,"url":null,"abstract":"An approach for assessing the security of an Air-Force-type network environment at the AFR 205-16 sensitive/unclassified Trusted Network Interpretation C2 levels is discussed. The first step in this approach was to assess the security for each stand-alone system. For the target network this was done using two separate assessment processes. The first was to assess the security profiles of functional area subsystems. Its main objective was to determine the necessary enhancements (in terms of internal hardware and software controls, physical, procedural, administrative, and Communications Security (COMSEC) controls) to bring these individual subsystems to the C2 level (as defined in DOD 5200.28-STD) and to provide protection for sensitive/unclassified systems as defined in AFR 205-16. The second process was to perform a similar security assessment of the ISDN (integrated services digital network) communications switch. In the second step, the information found from these two assessments was used to assess a target network.<<ETX>>","PeriodicalId":284420,"journal":{"name":"[1989 Proceedings] Fifth Annual Computer Security Applications Conference","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1989-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"An approach for evaluating the security of an Air Force type network\",\"authors\":\"N. Woodfield\",\"doi\":\"10.1109/CSAC.1989.81025\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An approach for assessing the security of an Air-Force-type network environment at the AFR 205-16 sensitive/unclassified Trusted Network Interpretation C2 levels is discussed. The first step in this approach was to assess the security for each stand-alone system. For the target network this was done using two separate assessment processes. The first was to assess the security profiles of functional area subsystems. Its main objective was to determine the necessary enhancements (in terms of internal hardware and software controls, physical, procedural, administrative, and Communications Security (COMSEC) controls) to bring these individual subsystems to the C2 level (as defined in DOD 5200.28-STD) and to provide protection for sensitive/unclassified systems as defined in AFR 205-16. The second process was to perform a similar security assessment of the ISDN (integrated services digital network) communications switch. In the second step, the information found from these two assessments was used to assess a target network.<<ETX>>\",\"PeriodicalId\":284420,\"journal\":{\"name\":\"[1989 Proceedings] Fifth Annual Computer Security Applications Conference\",\"volume\":\"48 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1989-12-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"[1989 Proceedings] Fifth Annual Computer Security Applications Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSAC.1989.81025\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"[1989 Proceedings] Fifth Annual Computer Security Applications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSAC.1989.81025","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An approach for evaluating the security of an Air Force type network
An approach for assessing the security of an Air-Force-type network environment at the AFR 205-16 sensitive/unclassified Trusted Network Interpretation C2 levels is discussed. The first step in this approach was to assess the security for each stand-alone system. For the target network this was done using two separate assessment processes. The first was to assess the security profiles of functional area subsystems. Its main objective was to determine the necessary enhancements (in terms of internal hardware and software controls, physical, procedural, administrative, and Communications Security (COMSEC) controls) to bring these individual subsystems to the C2 level (as defined in DOD 5200.28-STD) and to provide protection for sensitive/unclassified systems as defined in AFR 205-16. The second process was to perform a similar security assessment of the ISDN (integrated services digital network) communications switch. In the second step, the information found from these two assessments was used to assess a target network.<>