Red teaming for lifeline infrastructures

From supporting societies’ most basic human needs to enabling its most ambitious endeavors in commerce, science, and technology, lifeline services and critical infrastructures underpin modern civilization’s well-being and development. Without them, it would not be possible for governments to ensure people and businesses’ health, safety, and economic security [1]. Lifelines Read more…

An advice to technology C-Class, a matter of double responsibility.

The COVID-19 pandemic allows governments to employ “extraordinary measures” in favour of the public good, measure that could have significant effects in information policies (Cornelius, 2010). Government agencies around the world, along with private companies, are collecting and exploiting personal identifiable information (PII) to generate valuable insights to help support the Read more…

An abstract from “Security Controls for Computer Systems (U): Report of Defense Science Board Task Force on Computer Security”

With the advent of resource-sharing computer systems that distribute the capabilities and components of the machine configuration among several users or several tasks, a new dimension has been added to the problem of safeguarding computer-resident classified information. The basic problems associated with machine processing of classified information are not new. Read more…

An abstract form: “The Design and Specification of a Security Kernel for the PDP-11/45”

This paper presents the design of a kernel for certifiably secure computer systems being built on the Digital Equipment Corporation PDP-11/45. The design applies a general purpose mathematical model of secure computer systems to an off-the-shelf computer. An overview of the model is given. The paper includes a specification of Read more…

An abstract from “Preliminary Notes on the Design of Secure Military Computer Systems”

The military has a heavy responsibility for protection of information in its shared computer systems. The military must insure the security of its computer systems before they are put into operational use. That is, the security must be “certified”, since once military information is lost it is irretrievable and there Read more…

An abstract for “Proposed Technical Evaluation Criteria for Trusted Computer Systems”

The DoD has established a Computer Security Initiative to foster the widespread availability of trusted computer systems. An essential element of the Initiative is the identification of criteria and guidelines for evaluating the internal protection mechanisms of computer systems. This report documents a proposed set of technical evaluation criteria. These Read more…