Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Air Force Regulation 700–10, “Information Systems Security,” 15 March 1985.
Army Regulation 380–380, “Automated Systems Security,” 3 March 1985.
Department of Defense Computer Security Center, CSC-STD-002-85, “Department of Defense Password Management Guideline,” 12 April 1985.
Department of Defense Computer Security Center, CSC-STD-003-85, “Computer Security Requirements — Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria to Specific Environments,” 25 June 1985.
Department of Defense Computer Security Center, CSC-STD-004-85, “Technical Rationale Behind CSC-STD-003-85: Computer Security Requirements — Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments,” 25 June 1985.
Department of Defense Directive 5200.1-R, “Information Security Program Regulation,” June 1986.
Department of Defense Directive 5200.28, “Security Requirements for Automated Information Systems,” 21 March 1988
Department of Defense Directive 5200.28-M, “ADP Security Manual,” January 1973.
Department of Defense Directive 5200.28-STD, “Department of Defense Trusted Computer System Evaluation Criteria,” December 1985.
Department of Defense Directive 5215.1, “Computer Security Evaluation Center,” 25 October 1982.
Department of Defense Directive 5230.25, “Withholding of Unclassified Technical Data from Public Disclosure,” 6 November 1984.
Department of Defense Directive 7040.6, “Internal Control Systems,” 24 March 1982.
Department of Defense Instruction 5215.2, “Computer Security Technical Vulnerability Reporting Program (CSTVRP),” 2 September 1986.
Department of Energy Order 5635.1A, “Control of Classified Documents and Information,” 12 February 1988.
Department of Energy Order 5637.1, “Classified Computer Security Program,” 29 January 1988.
Director of Central Intelligence Directive 1/16, “Security Policy for Uniform Protection of Intelligence Processed in Automated Information Systems and Networks,” 19 July 1988. (SECRET)
Mitre Corp. Technical Report MTR-8201, “Trusted Computer Systems — Glossary,” March 1981.
National Security Decision Directive 145, “National Policy on Telecommunications and Automated Systems Security,” 17 December 1984.
Office of Navy Operations Instruction 5239.1A, “Department of the Navy Automatic Data Processing Security Program,” 8 March 1982.
Public Law 100–235, “Computer Security Act of 1987,” 8 January 1988.
Stein, Jess (ed.), “The Random House Dictionary of the English Language,” Random House, 1982.
Author information
Consortia
Editor information
Copyright information
© 1985 National Computer Security Center
About this chapter
Cite this chapter
US Department of Defense. (1985). Glossary of Computer Security Terms. In: The ‘Orange Book’ Series. Palgrave Macmillan, London. https://doi.org/10.1007/978-1-349-12020-8_13
Download citation
DOI: https://doi.org/10.1007/978-1-349-12020-8_13
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-0-333-53947-7
Online ISBN: 978-1-349-12020-8
eBook Packages: Computer ScienceComputer Science (R0)