The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Reports and Papers Archive


Browse All Papers »       Submit A Paper »


Multi-Agency Certification and Accreditation (C&A) Process: A Worked Example

Ellen Flahavin, Annabelle Lee, Dawn Wolcott
Added 2002-07-26


Good Security Practices for Electronic COmmerce, Including Electronic Data Interchange

Roy G. Saltman, ed.

Electronic Commerce (EC) is the use of documents in electronic form, rather than paper, for carrying out functions of business or government that require interchange of information, obligations, or monetary value between organizations.  ELectronic data interchange (EDI) is the computer -to-computer transmission of strictly formatted messages that represent documents; EDI is an essential component of EC.  With EC, human participation in routine transaction and decisions are made more rapidly, leaving much less time to detect and correct errors.  This report presents security procedures that and techniques (which encompass internal controls and checks) and operation of EC systems.  Principles of risk management and definition of parameters for quantitative risk assessments are provided.  The content of the trading partner agreement is discussed, and the components of EC, including the network (s) connecting the partners, are described.  Some security techniques considered include audit trails, contingency planning, use of acknowledgements, electronic document management, activities of supporting networks, user access controls to systems and networks, and cryptographic techniques for authentication and confidentiality.

Added 2002-07-26

Private Branch Exchange (PBX)

National Institute of Standards and Technology
Added 2002-07-26


Assessing federal and Commercial Information security Needs

David F. Farralolo, Dennis M. Gilbert, Nickilyn Lynch

In a cooperative effort with the government and industry, the National Institute of Standards and Technology (NIST) conducted a study to assess the current and future information technology (IT) security needs of the commercial, civil, and military sectors. The primary objectives of the study were to: * determine a basic set of information protection policies and control objectives that pertain to the secure processing needs of organizations within all sectors; and * identitfy protection requirements and technical approaches that are used, desired or sought so they can be concidered for future federal standards and guidelines. The findings of this study address the basic security needs of IT product users, including system developers, end users, administrators, and evaluators.  Security needs have been identified based on actual existing and well-understood security organizational practices.

Added 2002-07-26

Threat Assessment of Malicious Code and External Atacks

Lawrence E. Bassham, W. Timothy Polk
Added 2002-07-26

Minimum Security Requirements for Multi-User Operating Systems

U.S. Department of Commerce

The Minimum Security Requirements for Multi-User Operating Systems (MSR) document provides basic commercial computer system security requirements applicable to both government and commercial organizations.  These requirements include technical measures that can be incorporated into multi-user, remote -access, resource-sharing, and information-sharing computer systems.  The MSR document was written form the prospective of protecting the confidentiality and integrity of an organization\‘s resources and promoting the continual availabiliy of these resources.  The MSR presented in this document from the basis for the commercially oriented protection profiles in Volume II of the draft Federal Criteria for Information technology Security document (known as the federal Criteria).  The Federal Criteia is currently a draft and supersedes this document. The MSR document has been developed by the MSR Working Group Working Group of the Federal Criteria Project under National Institute of Standards and Technology (NIST) leadership with a high level of private sector participation.  Its contents are based on the Trusted Computer System Evaluation Criteria (TCSEC) C2 critetria class, with additions from current computer industry practice and commercial security requirements specifications.

Added 2002-07-26

Technology As Assessment: Methods for Measuring the Level of Computer Security

William Neugent, John Gilligan, Lance Hoffman, Zella G. Ruthberg

I

Added 2002-07-26

Keeping Your Site Comfortably Secure: An Introduction to Internet Firewalls Introduction

John P. Wack, Lisa J. Carnahan

This document provides an overview of the Internet and security-related problems.  It then provides an overview of firewall components and the general reasoning behind firewall usage.  Several types of network access policies are described, as well as technical implementations of those policies.  Lastly, the document contains pointers and references fo rmore detailed information. The document is designed to assist users in understanding the nature of Internet-related security problems and what types of firewalls will solve or alleviate specific problems.  Users can then use this document to assist in purchasing or planning a firewall.

Added 2002-07-26


Computer Security Training Guidelines

Mary Anne Todd, Constance Guitian
Added 2002-07-26

Accuracy, Integrity, and Security in Computerized Vote-Tallying

Roy G. saltman

Recommendations are rovided to promote accuracy, integrity, and security in computerized vote-tallying, and to improve confidence in the resuls produced.  The recommendations respond to identified problems, and conern software, hardware, operational procedures, and institutional changes. It is proposed that the concept of internal control, almost universally used to protect operations that produce priced goods or services, be adapted to vote-tallying, a non-priced service.  For software, recommendations concern certrification, assurance of logical correctness, and protection against containation by hidden code.  For hardware, recommendations concern accuracy of ballot reading, and design and certification of vote-tallying systems that do not use ballots.  Improved pre-election testing and parial manuel recounting of ballots are recommended operational procedures. Solme recent significant events concernign computerized cote-tallying are reported.  These events unclude development of performance speciafications, publication of a series pf New York Times articles, and activities in texas leading to passage of a revised statute on electronic voting systems. Relative vulnerabilities of different tpes of voting-tallying systems, i.e. punch card, mark-sense, and dircet recording electronic , are discussed.  Certain recent elections in which difficulties occurred are reviewed, and categories of failuere are highlighted.

Added 2002-07-26