Trusted Computer Systems. Needs and Incentives for Use in Government and the Private Sector,

reportActive / Technical Report | Accession Number: ADA103399 | Open PDF

Abstract:

The DoD Computer Security Initiative program is now demonstrating the feasibility of designing and implementing trusted computer systems that can provide high levels of protection to data, programs, and processing in certain constrained operational environments. Ultimately, full, multilevel secure operation will be possible in unconstrained operational environments. But, of course, physical, administrative, personnel, and communications security will always be required. An Evaluation Center for trusted systems is being established for the DoD at NSA. This Center will maintain an Evaluated Products List of systems submitted to it. Before an Evaluated Products List can be of practical value, however, the need for trusted systems in the government and the private sector must be sufficiently great for system vendors to perceive a marketplace beyond national-defense requirements that warrants submission of their systems for evaluation. Trusted systems can contribute effectively to the solution of the growing problems of protection of assets and resources, compliance with laws and regulations, assurance of safety and integrity, and implementation of full management control. In addition, trusted systems may provide operational economies, marketing advantages, and public-image enhancement. They are needed in a variety of applications that constitute a market that should be of considerable interest to vendors.

Security Markings

DOCUMENT & CONTEXTUAL SUMMARY

Distribution:
Approved For Public Release

RECORD

Collection: TR
Identifying Numbers
Subject Terms