Wednesday, October 5, 2011

the other task from my miss

COMPUTER SECURITY

Computer security is a branch of computer technology known as Information Security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. The term computer system security means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively. The strategies and methodologies of computer security often differ from most other computer technologies because of its somewhat elusive objective of preventing unwanted computer behavior instead of enabling wanted computer behavior.

One use of the term computer security refers to technology to implement a secure operating system. Much of this technology is based on science developed and used to produce what may be some of the most impenetrable operating systems ever.

refference:http://en.wikipedia.org/wiki/Computer_security


A TRUSTED OPERATING SYSTEM

Trusted Operating System (TOS) generally refers to an operating system that provides sufficient support for multilevel security and evidence of correctness to meet a particular set of government requirements.

The most common set of criteria for trusted operating system design is the Common Criteria combined with the Security Functional Requirements (SFRs) for Labeled Security Protection Profile(LSPP) and Mandatory Access Control(MAC). The Common Criteria is the result of a multi-year effort by the governments of the U.S., Canada, United Kingdom, France, Germany, and the Netherlands to develop a harmonized security criteria for IT products.


Examples of operating systems that might be certifiable are:



http://en.wikipedia.org/wiki/Trusted_operating_system

No comments:

Post a Comment