S.S. Yau CSE Fall Classified Systems
S.S. Yau 2CSE Fall 2006 Classified Systems Early 1980s: DoD is concerned about the confidentiality of classified information on computers with multiple users (time sharing systems) Early 1980s: DoD is concerned about the confidentiality of classified information on computers with multiple users (time sharing systems) Mid 80s to mid 90s: Mid 80s to mid 90s: The Orange Book (or TCSEC): standard reference for computer security for DoD The Orange Book (or TCSEC): standard reference for computer security for DoD The Red Book: covering Trusted Network Interpretation (TNI) of the Orange Book The Red Book: covering Trusted Network Interpretation (TNI) of the Orange Book The whole “rainbow series” The whole “rainbow series” nbow/rainbow.html nbow/rainbow.html nbow/rainbow.html nbow/rainbow.html
S.S. Yau 3CSE Fall 2006 DoD Classification Scheme Data classification based on need for confidentiality Data classification based on need for confidentiality Levels based on potential damage if compromised, and defines treatment rules Levels based on potential damage if compromised, and defines treatment rules Top secret Top secret Secret Secret Confidential Confidential Unclassified Unclassified Unclassified includes Unclassified includes Sensitive But Unclassified (SBU); e. g., medical, salary, performance review data Sensitive But Unclassified (SBU); e. g., medical, salary, performance review data For Official Use Only (FOUO). Not subject to release under the Freedom of Information Act (FOIA). May include company proprietary information. For Official Use Only (FOUO). Not subject to release under the Freedom of Information Act (FOIA). May include company proprietary information.
S.S. Yau 4CSE Fall 2006 Classified Information Management Accountability for classified data Accountability for classified data Declassification/Downgrade Declassification/Downgrade Sanitization/Purging Sanitization/Purging Destruction Destruction
S.S. Yau 5CSE Fall 2006 References M. Merkow, J. Breithaupt, Information Security: Principles and Practices, Prentice Hall, August 2005, ISBN M. Merkow, J. Breithaupt, Information Security: Principles and Practices, Prentice Hall, August 2005, ISBN Matt Bishop, Introduction to Computer Security, Addison-Wesley, 2004, ISBN: Matt Bishop, Introduction to Computer Security, Addison-Wesley, 2004, ISBN: Matt Bishop, Computer Security: Art and Science, Addison- Wesley, 2002, ISBN: Matt Bishop, Computer Security: Art and Science, Addison- Wesley, 2002, ISBN: