Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Trusted Computer System Evaluation Criteria (TCSEC)

Encyclopedia of Information Technology Curriculum Integration
The Trusted Computer System Evaluation Criteria (TCSEC) was issued by the U.S. Department of Defense (1985 AU16: The in-text citation "Defense (1985" is not in the reference list. Please correct the citation, add the reference to the list, or delete the citation. ) directive DoD 5200.28-STD in December 1985. It was one of the first models to evaluate information systems in increasing terms of security. Its main goal was to provide hardware and software criteria and evaluation methodologies. It was contained in a set of documents called the rainbow series, and widely referred to by the color of the document, for example, the orange book.
Published in Chapter:
Understanding Computer Security
Steve Brown (Capella University, USA)
Copyright: © 2008 |Pages: 7
DOI: 10.4018/978-1-59904-881-9.ch144
Abstract
During the last several years a great deal has been written in academic and trade journals that has focused on security. There are several different terms often used, but the following—information security (InfoSec), computer security, and information assurance—are typically meant to be the same, that is, the protection of data, although information assurance is also expanded to include aspects such as personnel, plant, and equipment. While one main theme that has been written has been to improve the effectiveness and understanding of security, apply the various security concepts learned and understand the technologies developed, it is important to recognize that computer security may take on different meanings, dependent on the context that it is being discussed. Computer security is a very large field, and one that is often misunderstood. When we discuss computer security, are we discussing our personal computer at work or home? Are we discussing portable devices, such as mobile devices like Blackberries, PDAs, or laptops? Are we discussing security laws and regulations that might impact the safeguard of personal information, or could we be discussing, designing, and implementing, a risk-based security plan for an organization? It is therefore difficult to discuss computer security unless it is discussed in a frame of reference. Therefore, this paper will discuss some of the issues and concerns of computer security in different frames of reference, and the importance of teaching security with that focus in mind.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR