Skip to main content

Glossary of Computer Security Terms

  • Chapter
The ‘Orange Book’ Series
  • 1022 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Air Force Regulation 700–10, “Information Systems Security,” 15 March 1985.

    Google Scholar 

  • Army Regulation 380–380, “Automated Systems Security,” 3 March 1985.

    Google Scholar 

  • Department of Defense Computer Security Center, CSC-STD-002-85, “Department of Defense Password Management Guideline,” 12 April 1985.

    Google Scholar 

  • Department of Defense Computer Security Center, CSC-STD-003-85, “Computer Security Requirements — Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria to Specific Environments,” 25 June 1985.

    Google Scholar 

  • Department of Defense Computer Security Center, CSC-STD-004-85, “Technical Rationale Behind CSC-STD-003-85: Computer Security Requirements — Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments,” 25 June 1985.

    Google Scholar 

  • Department of Defense Directive 5200.1-R, “Information Security Program Regulation,” June 1986.

    Google Scholar 

  • Department of Defense Directive 5200.28, “Security Requirements for Automated Information Systems,” 21 March 1988

    Google Scholar 

  • Department of Defense Directive 5200.28-M, “ADP Security Manual,” January 1973.

    Google Scholar 

  • Department of Defense Directive 5200.28-STD, “Department of Defense Trusted Computer System Evaluation Criteria,” December 1985.

    Google Scholar 

  • Department of Defense Directive 5215.1, “Computer Security Evaluation Center,” 25 October 1982.

    Google Scholar 

  • Department of Defense Directive 5230.25, “Withholding of Unclassified Technical Data from Public Disclosure,” 6 November 1984.

    Google Scholar 

  • Department of Defense Directive 7040.6, “Internal Control Systems,” 24 March 1982.

    Google Scholar 

  • Department of Defense Instruction 5215.2, “Computer Security Technical Vulnerability Reporting Program (CSTVRP),” 2 September 1986.

    Google Scholar 

  • Department of Energy Order 5635.1A, “Control of Classified Documents and Information,” 12 February 1988.

    Google Scholar 

  • Department of Energy Order 5637.1, “Classified Computer Security Program,” 29 January 1988.

    Google Scholar 

  • Director of Central Intelligence Directive 1/16, “Security Policy for Uniform Protection of Intelligence Processed in Automated Information Systems and Networks,” 19 July 1988. (SECRET)

    Google Scholar 

  • Mitre Corp. Technical Report MTR-8201, “Trusted Computer Systems — Glossary,” March 1981.

    Google Scholar 

  • National Security Decision Directive 145, “National Policy on Telecommunications and Automated Systems Security,” 17 December 1984.

    Google Scholar 

  • Office of Navy Operations Instruction 5239.1A, “Department of the Navy Automatic Data Processing Security Program,” 8 March 1982.

    Google Scholar 

  • Public Law 100–235, “Computer Security Act of 1987,” 8 January 1988.

    Google Scholar 

  • Stein, Jess (ed.), “The Random House Dictionary of the English Language,” Random House, 1982.

    Google Scholar 

Download references

Author information

Consortia

Editor information

Copyright information

© 1985 National Computer Security Center

About this chapter

Cite this chapter

US Department of Defense. (1985). Glossary of Computer Security Terms. In: The ‘Orange Book’ Series. Palgrave Macmillan, London. https://doi.org/10.1007/978-1-349-12020-8_13

Download citation

  • DOI: https://doi.org/10.1007/978-1-349-12020-8_13

  • Publisher Name: Palgrave Macmillan, London

  • Print ISBN: 978-0-333-53947-7

  • Online ISBN: 978-1-349-12020-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics