Access the full text.
Sign up today, get DeepDyve free for 14 days.
I) To what extent is testing needed in a general evaluation? Only to determine the existence of controls defined in or above the functional specification
Non-real-tlme techniques include journals (audit trails) of accesses, errors, and transactions; trend analysis; reports; and journal query capabilities
I) What criteria influence the level of detail necessary in a security evaluation for certification? Sensitivity, evidence, the degree of embedded control
Real-time techniques are those involving direct notification of a security authority or direct initiation of detection and surveillance actions requested by a security authority
33. (I) Should a security evaluation report discuss only vulnerabilities or should it also address aspects of security that are acceptably treated? Both
32. (I) What is the value of stress testing for security? It often reveals unanticipated problems too complex to be easily detected by analysis of system documentation
Istinguish between real-tlme and non-real-time detection and surveillance techniques
This article presents an overview of a graduate-level course in computer security that I created and presented at The American University in Washington D.C. It should be of interest to SIGSAC Review readers who want an overview of the subject or who are teaching similar courses. There are three key elements:1. Course syllabus. This includes a course outline. Emphasis is placed on balanced coverage of all major relevant issues rather than specialized coverage of a few.2. List of research assignments. Twenty two projects are listed. These are areas where computer security research is needed. Work in any area should provide good material for a paper.3. Examinations. Seventy five questions are listed, along with their answers. These can serve as an introduction and reference for computer security neophytes.
ACM SIGSAC Review – Association for Computing Machinery
Published: Apr 1, 1982
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.