EditWYSIWYGAttach PDF Raw View►More Actions▼More Actions


Restore topic to revision: You will be able to review the topic before saving it to a new revision

Copy text and form data to a new topic (no attachments will be copied though).
Name of copy:
You will be able to review the copied topic before saving

Rename/move topic... scans links in all public webs (recommended)
Rename/move topic... scans links in CBI_ComputerSecurity web only
Delete topic... scans links in all public webs (recommended)
Delete topic... scans links in CBI_ComputerSecurity web only

Revision Date Username Comment
623 Nov 2014 - 19:01ThomasMisa 
503 Oct 2013 - 15:17norqu036? 
406 May 2013 - 11:06NicLewis 
325 Mar 2013 - 08:52NicLewis 
225 Feb 2013 - 10:21NicLewis 
121 Feb 2013 - 08:40NicLewis 

Render style:     Context:


 History: r6 | r4 < r3 < r2 < r1
[X] Hide this message.
Notice: On June 30, 2016, UMWiki service will be decommissioned. If you have information in UMWIki that needs to be preserved, you should make plans to move it before that date. Google Sites is anticipated to be the most popular and appropriate alternative for users because it offers a more modern and user-friendly interface and unlimited capacity. To learn more about the features of Google Sites and other alternatives, and to identify which one best fits your needs, see the University’s Website Solution Selection Guide. If you have concerns or would like help regarding this change and your options, please contact Technology Help at help@umn.edu
You are here: UMWiki>CBI_ComputerSecurity Web>Programs>ProgramsCSI (revision 1)

Computer Security Initiative

 

The United States Department of Defense Computer Security Initiative was started in 1977 under the auspices of the Under Secretary of Defense for Research and Engineering to focus DoD efforts addressing computer security issues. The initiative was launched in 1978 when the DoD called together government and industry participants in a series of seminars, with the goal of answering several questions: 1) Are secure computer systems useful and feasible? 2) What mechanisms should be developed to evaluate and approve secure computer systems? 3) How can computer vendors be encouraged to develop secure computer systems?

Sources:
TCSEC - Trusted Computer System Evaluation Criteria (TCSEC).
http://flylib.com/books/en/2.624.1.18/1/

-- Main.lewi0740 - 28 Nov 2012

Edit | WYSIWYG | Attach |  PDF |  History: r6 | r4 < r3 < r2 < r1 |  Backlinks |  Raw View | More topic actions...
Topic revision: r1 - 21 Feb 2013 - 08:40:36 - NicLewis
 
Signed in as lewi0740 (NicLewis) | Sign out
UMWiki UMWiki
This site is powered by FoswikiCopyright © by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding UMWiki? Send feedback