By Topic

An approach for evaluating the security of an Air Force type network

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
N. K. Woodfield ; CTA Inc., Colorado Springs, CO, USA

An approach for assessing the security of an Air-Force-type network environment at the AFR 205-16 sensitive/unclassified Trusted Network Interpretation C2 levels is discussed. The first step in this approach was to assess the security for each stand-alone system. For the target network this was done using two separate assessment processes. The first was to assess the security profiles of functional area subsystems. Its main objective was to determine the necessary enhancements (in terms of internal hardware and software controls, physical, procedural, administrative, and Communications Security (COMSEC) controls) to bring these individual subsystems to the C2 level (as defined in DOD 5200.28-STD) and to provide protection for sensitive/unclassified systems as defined in AFR 205-16. The second process was to perform a similar security assessment of the ISDN (integrated services digital network) communications switch. In the second step, the information found from these two assessments was used to assess a target network

Published in:

Computer Security Applications Conference, 1989., Fifth Annual

Date of Conference:

4-8 Dec 1989