Explore the TechTarget Network at SearchTechTarget.com.Activate your FREE membership today | Log-in

MagazineConferencesWeb SitesTechTarget Security Media
Part of the TechTarget Network of Enterprise IT Web Sites
HomeNewsTopicsITKnowledge ExchangeTipsWebcastsWhite PapersProducts
SEARCH this site and the webADVANCED SEARCH  |  SITE MAPSearch Powered by Google
Home > Tips > Compliance Counselor >

Security -- The...

EMAIL THIS PAGE TO A FRIEND

Security Tips:

 TIPS & NEWSLETTERS TOPICS 
Search for:   in   Full TargetSearch with Google

COMPLIANCE COUNSELOR
Security -- The Common Criteria
James Stewart
29 Jan 2002
Rating: -3.75- (out of 5)



Security has become THE hot topic. You'll probably see more discussion and emphasis on security in 2002 than you have in the last ten years. Why? Because the world is moving toward complete electronic communication where everything from the conversations on your mobile phone to your medical records to your credit card statements are now only digital bits floating around cyberspace.

Many organizations are rushing to assemble a security policy that defines, prescribes and enforces the security measures they deem appropriate and necessary for their industry. However, without a solid guideline, a custom security policy can often act more like a screen door with a rip, instead of a sealed submarine hatch.

There are several means by which an organization can create a security policy which contains fewer holes than otherwise. These include starting off with another organization's policy and customizing it as needed and hiring a security consultant to create a policy from scratch. Both of these options have benefits and drawbacks, most of which are obvious.

If your organization is determined to create an internal document with as little external help as possible, then there are other alternatives for you: the ISO17799 Standard or the Common Criteria. Both of these documents will provide you with a wealth of information related to security policies and the security features of computers and software products.

The ISO17799 Standard is a set of security standards that were originally defined by the British Standards Institution as BS 7799. The original standards were adopted and approved by the ISO, IEC and JTC1 (International Electrotechnical Commission, International Organization for Standardization and Joint Technical Committee). In 1998 these standards were re-formulated to allow for evaluation of compliance with the standards. The ISO17799 defines a framework for security policy. You can learn more about ISO17799 from www.iso17799-web.com. However, to see the contents of the standard, you'll have to purchase them.

Another alternative, especially for those within the United States, is the Common Criteria. The Common Criteria (also known as International Standard 15408) was created by a joint effort between security organizations from the U.S., Canada, France, Germany, the Netherlands and the U.K. The Common Criteria replace the previous standard of C2 or orange book certification. Unlike the ISO17799 Standard, the Common Criteria defines the features of computer systems and products which offer support and control security. For more information on the Common Criteria, visit http://csrc.nist.gov/cc/ or http://www.commoncriteria.org/. You can download a free copy of the Common Criteria from either site.


About the author

James Michael Stewart is a researcher and writer for Lanwrights, Inc.

DISCLAIMER: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.


Do you like this tip? Email your opinion or rate the tip:

Rate this Tip: In order to rate this tip, you must be a registered member of searchSecurity.com

Register now to start rating these tips

Already a member? Log In




Free tips via email


  WHAT'S NEW
 1. E-mail Security Seminar Series
 2. Information Security Decisions Spring 05
 3. Featured article: "How secure are you?"
 4. Attend the 3-part E-mail Security School
SECURITY RELATED LINKS
Ads by Google

Compliance experts
Experts in IT-related legislation HIPAA, Gramm-Leach, SB 1386, etc.
www.lcpros.com

SOX Consulting
Wir beraten bei Sarbanes Oxley Act We consult you for Sarbanes Oxley
www.consuvation.com

ISO 17799 Implementation
Meet compliance without sacrificing quality. Process, not Product
www.hotskills-inc.com

160 IT Security Policies
For BS-7799 & ISO-17799 Includes Standards and database
www.itsecuritypolicygenerator.com/i

Need HIPAA Compliance?
Want to send encrypted messages? Download a free white paper today.
www.voltage.com

TechTarget Security Media
Information SecurityView this month's issue and subscribe today.
Information Security DecisionsApply online for free conference admission.
SearchSecurity.com
HomeNewsTopicsITKnowledge ExchangeTipsWebcastsWhite PapersProducts
About Us  |  Contact Us  |  For Advertisers  |  For Business Partners  |  Reprints  |  RSS
SEARCH 
SearchSecurity.com is part of the TechTarget network of industry-specific IT Web sitesSearchSecurity.com is part of the TechTarget network of industry-specific IT Web sites
WINDOWS
SearchExchange.com
SearchSQLServer.com
SearchVB.com
SearchWin2000.com
SearchWindowsSecurity.com
SearchWinSystems.com
Labmice.net
MyITForum.com

APPLICATIONS
SearchCRM.com
SearchSAP.com

ENTERPRISE IT MANAGEMENT
SearchCIO.com
SearchDataCenter.com
SearchSMB.com

CORE TECHNOLOGIES
SearchEnterpriseVoice.com
SearchMobileComputing.com
SearchNetworking.com
SearchOracle.com
SearchSecurity.com
SearchStorage.com
SearchWebServices.com
WhatIs.com

PLATFORMS
Search390.com
Search400.com
SearchDomino.com
SearchEnterpriseLinux.com
TechTarget Expert Answer Center  |  TechTarget Enterprise IT Conferences  |  TechTarget Corporate Web Site  |  Media Kit

Explore SearchTechTarget.com, the guide to the TechTarget network of industry-specific IT Web sites.

All Rights Reserved, Copyright 2000 - 2005, TechTargetRead our Privacy Statement