首页> 美国政府科技报告 >Final Evaluation Report of Computer Accessories Inc., Private Access.
【24h】

Final Evaluation Report of Computer Accessories Inc., Private Access.

机译:私人通道计算机配件公司的最终评估报告。

获取原文

摘要

The product Private Access has been evaluated by the National Computer Security Center (NCSC). Private Access is considered to be a subsystem, rather than a complete trusted computer system, and therefore it was evaluated against a relevant subset of the security requirements in the Department of Defense Trusted Computer System Evaluation Criteria, dated December 1985, here after referred to as the Criteria. The subsets for this product include Identification and Authentication (IA) and Audit. The NCSC evaluation team has determined that Private Access applies these security features to any system that uses standard, dialup telephone lines for access to its systems. Private Access can protect one personal Computer from unauthorized access over a single telephone line. No security is provided for local operation. Private Access uses a variable password and fixed callback procedures to guarantee the authenticity of users and their location. Additionally, Private Access has time of use restrictions and an audit of IA actions. Private Access will turn on its host system giving an authorized user complete control over the host computer. The remote access feature, used in conjunction with software not provided by the company, will allow the remote user to run the host computer without returning system control to the host. (This return to the default terminal occurs with some program calls). Private Access will power down the system if an illegal access attempt is made. A limit of 100 user ID's/Passwords may be assigned. Privileged users can modify the trusted secure data base remotely.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号