dynamoo.com home

 


Site navigation

home
technical
diary
webmaster
orange book
moobiles
shop
contact
links
  
Updated June 2002

Hacking Exposed: Second Edition
Buy this book at amazon.comBuy this book at amazon.co.uk

 

 Computer Security Basics

Buy this book at amazon.comBuy this book at amazon.co.uk

 

 Information Security Management Handbook

Buy this book at amazon.comBuy this book at amazon.co.uk

 

 

Orange Book Summary Chart

 

A1
B3
B2
B1
C2
C1
Discretionary Access Control No additional requirements Additional requirements No additional requirements No additional requirements Additional requirements Additional requirements
Object Reuse No additional requirements No additional requirements No additional requirements No additional requirements Additional requirements No requirements
Labels No additional requirements No additional requirements Additional requirements Additional requirements No requirements No requirements
Label Integrity No additional requirements No additional requirements No additional requirements Additional requirements No requirements No requirements
Exportation of labeled information No additional requirements No additional requirements No additional requirements Additional requirements No requirements No requirements
Exportation to multilevel devices No additional requirements No additional requirements No additional requirements Additional requirements No requirements No requirements
Exportation to single-level devices No additional requirements No additional requirements No additional requirements Additional requirements No requirements No requirements
Labeling Human-Readable output No additional requirements No additional requirements No additional requirements Additional requirements No requirements No requirements
Mandatory Access Control No additional requirements No additional requirements Additional requirements Additional requirements No requirements No requirements
Subject Sensitivity Labels No additional requirements No additional requirements Additional requirements No requirements No requirements No requirements
Device Labels No additional requirements No additional requirements Additional requirements No requirements No requirements No requirements
Identification and Authentication No additional requirements No additional requirements No additional requirements Additional requirements Additional requirements Additional requirements
Audit No additional requirements Additional requirements Additional requirements Additional requirements Additional requirements No requirements
Trusted Path No additional requirements Additional requirements Additional requirements No requirements No requirements No requirements
System Architecture No additional requirements Additional requirements Additional requirements Additional requirements Additional requirements Additional requirements
System Integrity No additional requirements No additional requirements No additional requirements No additional requirements No additional requirements Additional requirements
Security Testing Additional requirements Additional requirements Additional requirements Additional requirements Additional requirements Additional requirements
Design Specification & Verification Additional requirements Additional requirements Additional requirements Additional requirements No requirements No requirements
Covert Channel Analysis Additional requirements Additional requirements Additional requirements No requirements No requirements No requirements
Trusted Facility Management No additional requirements Additional requirements Additional requirements No requirements No requirements No requirements
Configuration Management Additional requirements No additional requirements Additional requirements No requirements No requirements No requirements
Trusted Recovery No additional requirements Additional requirements No requirements No requirements No requirements No requirements
Trusted Distribution Additional requirements No requirements No requirements No requirements No requirements No requirements
Security Features User's Guide No additional requirements No additional requirements No additional requirements No additional requirements No additional requirements Additional requirements
Trusted Facility Manual No additional requirements Additional requirements Additional requirements Additional requirements Additional requirements Additional requirements
Test Documentation Additional requirements No additional requirements Additional requirements No additional requirements No additional requirements Additional requirements
Design Documentation Additional requirements Additional requirements Additional requirements Additional requirements No additional requirements Additional requirements
A1
B3
B2
B1
C2
C1

 

Key:
No additional requirements No additional requirements for this class
Additional requirements Additional requirements for this class
No requirements No requirements for this class

 

Recommended titles at Amazon.com:
Hacking Exposed: Second Edition (US) / (UK)
Computer Security Basics (US) / (UK)
Information Security Management Handbook (US) / (UK)
The Information Systems Security Officer's Guide (US) / (UK)
Mastering Network Security (US) / (UK)
Computer Security Handbook (US only)

Subj: Shopping and Services

Dynamoo 1997-2002   home   technical   diary   webmaster stuff   orange book   shop   contact   links   your privacy