000 02227cam  2200373zi 4500
0019.870696
003CaOODSP
00520221107163205
006m     o  d f      
007cr |||||||||||
008190327s2019    onca   #o    f000 0 eng d
040 |aCaOODSP|beng|erda|cCaOODSP
043 |an-cn---
0861 |aD97-3/80-32-2018E-PDF
24500|aCalculating robustness for boundary controls.
264 1|a[Ottawa] : |bCommunications Security Establishment = Centre de la sécurité des télécommunications, |c2019.
300 |a1 online resource (30 pages) : |billustrations.
336 |atext|btxt|2rdacontent
337 |acomputer|bc|2rdamedia
338 |aonline resource|bcr|2rdacarrier
4901 |aPractitioner series, information technology security guidance ; |vITSP.80.032
500 |aIssued also in French under title: Détermination de la robustesse des contrôles de périmètre.
500 |aIssued also in HTML format.
500 |a"Unclassified."
500 |a"March 2019."
504 |aIncludes bibliographical references.
520 |a"One of the key challenges for security practitioners is ensuring that the robustness level of all security mechanisms protecting a given security domain boundary are the same. This guidance publication seeks to address this challenge by providing criteria for the selection of both the assurance and strength-of-mechanism requirements of cryptographic, authentication, and cross-domain security mechanisms. We recommend that organizations apply this guidance when considering or developing solutions for interconnecting information systems in different security domains, especially if one or more of these domains is classified"--Overview, page 3.
69207|2gccst|aComputer security
7102 |aCanadian Centre for Cyber Security.
7102 |aCommunications Security Establishment (Canada)
77508|tDétermination de la robustesse des contrôles de périmètre.|w(CaOODSP)9.870698
830#0|aPractitioner series, information technology security guidance ;|vITSP.80.032.|w(CaOODSP)9.842846
85640|qPDF|s1.12 MB|uhttps://publications.gc.ca/collections/collection_2019/cstc-csec/D97-3-80-32-2019-eng.pdf