웨어 리포트
Ware report일반적으로 Ware [1][2]보고서라고 불리는 Security Controls for Computer Systems는 Willis Ware의 1970년 텍스트로 컴퓨터 [3]보안 분야에서 기초가 되었습니다.
발전
세인트루이스의 방위사업자.미주리 주 루이스는 IBM 메인프레임 컴퓨터를 구입했는데, 이 컴퓨터는 전투기의 [4]기밀 업무에 사용되었습니다.추가 수입을 제공하기 위해 계약자는 기밀 작업이 진행되는 [4]동안 메인프레임의 컴퓨터 시간을 원격 단말기를 통해 현지 기업에 판매할 수 있는 허가를 국방부(DoD)에 요청했습니다.
당시 국방부는 이 문제를 다루는 정책을 가지고 있지 않았다.국방부의 고등연구계획국(ARPA)은 RAND 직원인 웨어에게 컴퓨터 [4][5]시스템에 대한 보안 제어의 타당성을 검토하고 보고하기 위한 위원회의 의장을 맡아줄 것을 요청했다.
위원회의 보고서는 1970년 1월 국방과학위원회([4]DSB)에 제출된 기밀문서였다.기밀 해제 후,[4] 그 보고서는 1979년 10월에 랜드에 의해 출판되었다.
영향을 주다
IEEE Computer Society는 이 보고서가 널리 [1]유포되었다고 말했으며 IEEE 컴퓨팅 역사 연보(Annals of Computing)는 Ware의 1967년 봄 공동 컴퓨터 컨퍼런스 세션과 함께 컴퓨터 [3][6]보안 분야의 시작을 알렸다고 말했습니다.
이 보고서는 보안 인증 기준과 프로세스에 영향을 미쳤으며, 특히 은행 및 방위 산업에서 이 보고서가 오렌지북을 [2]만드는 데 중요한 역할을 했습니다.
외부 링크
레퍼런스
- ^ a b "Willis Howard Ware". IEEE Computer Society. Retrieved 2020-12-20.
Security Controls for Computer Systems, tech. report R-609-PR, RAND, Defense Science Board Task Force on Computer Security, 1972. R-609- 1-PR was reissued Oct. 1979. This widely circulated report was informally known as 'the Ware report.'
- ^ a b Murdoch, Steven; Bond, Mike; Anderson, Ross J. (Nov–Dec 2012). "How Certification Systems Fail: Lessons from the Ware Report" (PDF). IEEE Security & Privacy. 10 (6): 40–44. doi:10.1109/MSP.2012.89. S2CID 20231.
The heritage of most security certification standards in the banking industry can be traced back to ... 'Security Controls for Computer Systems' (commonly known as the Ware Report...), focussed on the problem of protecting classified information in multi-access, resource-sharing, computer systems which were at the time being increasingly used by both the government and defense contractors. The report included not only recommendations for what security functionality such systems should have in order to safely process classified information, but also proposed certification procedures for verifying whether a system meets these criteria. These certification procedures formed the basis for the Trusted Computer System Evaluation Criteria (TCSEC). The requirements and assessment criteria for TCSEC are given in 5200.28-STD, colloquially known as the 'Orange Book', but that publication is augmented by others in the 'Rainbow Series', expanding and clarifying various aspects.
- ^ a b Misa, Thomas J. (October–December 2016). "Computer Security Discourse at RAND, SDC, and NSA (1958-1970)". IEEE Annals of the History of Computing. IEEE Computer Society. 38 (4): 12–25. doi:10.1109/MAHC.2016.48. ISSN 1058-6180. S2CID 17609542.
The 1967 Spring Joint Computer Conference session organized by Willis Ware and the 1970 Ware Report are widely held by computer security practitioners and historians to have defined the field's origin.
- ^ a b c d e Ware, Willis H. (2008). RAND and the information evolution : a history in essays and vignettes (PDF). RAND Corporation. ISBN 978-0-8330-4513-3.
- ^ Pfleeger, Charles P. (October 10, 2000). "Computer Security from the Trojan Wars to the Present". Proceedings of the 23rd National Information Systems Security Conference (PDF). 23rd National Information Systems Security Conference. Baltimore, Maryland, United States: NIST.
Willis Ware (chair), 1967 Defense Science Board Study. Problem: Significant number of systems being acquired for military use. Charge: Formulate recommendations for hardware and software safeguards to protect classified information in multi-user, resource-sharing computer systems.
- ^ Yost, Jeffrey R. (October–December 2016). "Computer Security, Part 2" (PDF). IEEE Annals of the History of Computing. IEEE Computer Society. 38 (4): 10–11. doi:10.1353/ahc.2016.0040. S2CID 35453662. Archived from the original (PDF) on 2019-02-20.
The 1970 (Willis H.) Ware Report and the 1967 Spring Joint Computer Conference (SJCC) Ware-led 'Computer Security and Privacy' session are focal points of historians and computer security scientists and are generally considered the beginning of multilevel computer security.