Secure USB Media Considerations for a Common Criteria Protection Profile

Author(s):  
Henning Arendt ◽  
Marcel Weinand
2013 ◽  
Vol 10 (6) ◽  
pp. 609-620
Author(s):  
Byung-Hee Hwang ◽  
Ho-Sung Jeon ◽  
Young-Sam Bae ◽  
Dong-Hoon Lee

1997 ◽  
Author(s):  
Kris Britton ◽  
Jack Walsh ◽  
Wayne Jansen ◽  
Thomas Kaygiannis ◽  
Jandria Alexander

2019 ◽  
Vol 26 (1) ◽  
pp. 134-145
Author(s):  
Andrey N. Petukhov ◽  
Paul L. Pilyugin

«Common criteria» (ISO 15408) is a universally recognized and broadly applicable approach to information security solutions management and evaluation. «Common criteria» leans on developing a shared conceptual basis for key security solution modules including protection profiles and security targets. Conceptual basis development implies defining the following elements: security objectives and assumptions (for the environment and the object), threats and security policies, as well as functional and assurance requirements. The specifics of SDN (software defined network) security solutions is largely driven by fundamental architectural principles of SDN technology itself − primarily by the separation of control and data flows, − and by conditions imposed by Open Flow protocol application. However, proactive (threats and policies), passive (objectives and assumptions) and reactive (requirements) aspects of security management remain highly relevant for this type of security solutions. This paper discusses the Common Criteria application specifics for assessing the SDN security and practical MTUCI (Moscow Technical University of Communications and Informatics) experience in the development of the protection profile. A new class of network attacks on SDN switches and controllers can involve either data or control components. In addition to traditional vulnerabilities, centralization of management functions paves way for new security threats by isolating controller activity and administrative message exchange. Therefore, identifying and analyzing threats, policies and requirements specific to SDN control module security becomes an emerging priority.


2020 ◽  
Vol 99 (5) ◽  
pp. 271-275
Author(s):  
N.B. Guseva ◽  
◽  
S.S. Nikitin ◽  
R.O. Ignatiev ◽  
E.V. Mlynchik ◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document