CESG Directory of INFOSEC Assured Products

Total Page:16

File Type:pdf, Size:1020Kb

CESG Directory of INFOSEC Assured Products Important Information – Please Read THE DIRECTORY OF INFOSEC ASSURED PRODUCTS Users of this Directory must be aware that the most up-to-date version of Infosec Assured Products are available at www.cesg.gov.uk For current information on IA products and their usage please see the individual product entries using the product search facilities at www.cesg.gov.uk THIS DOCUMENT WAS CORRECT AT TIME OF PRODUCTION OCTOBER 2010 SECTION 1 SECTION 10 Introduction Operating Systems SECTION 2 SECTION 11 Access Control Protection Profiles SECTION 3 SECTION 12 Airwave Miscellaneous SECTION 4 SECTION 13 Communications TEMPEST SECTION 5 SECTION 14 Database Mobile Solutions SECTION 6 SECTION 15 Data Encryption IACS Scheme SECTION 16 SECTION 7 External Common Data-Erasure Criteria Scheme SECTION 17 SECTION 8 Index Firewalls Related Abbreviations SECTION 9 Networking Directory of Infosec Assured Products 2010 Page 1.2 For End Users… Products which have been certified by us, or by our partners This ‘Directory of Infosec Assured Products’ is a top-level around the world, offer end users ready-made assurance. guide listing all IT security products approved by CESG. The This allows the customer to determine whether the product Directory lists products by type, and in addition gives brief is appropriate for his needs. If assurance is required in a details of the means by which products are approved or system, then a range of packages, including IT Security certified, an overview of the products’ features, and the Health Check, is available. context in which they should be used. There is also a contact list of product vendors. A brief description of these schemes can be found in the Schemes Annex from page 14.2 more comprehensive details A downloadable version of the current Directory is available on each scheme are available on the CESG website, from the CESG website – www.cesg.gov.uk. www.cesg.gov.uk. As information on assured products is available via the product search facilities at www.cesg.gov.uk, which includes both the Certified Product Search and CESG Assisted Products Formal Evaluation and Certification Service (CAPS) Product Search. In the Directory, products will be identified as certified against either CC or ITSEC or in accordance with UK IT products and systems evolve rapidly and are increasingly Cryptographic Standards. Certificates are award following diverse and complicated. Similarly, customer requirements extensive testing of the product’s IT security features to change and expand to counter new threats and to adapt to ensure that those features meet an agreed Security Target. new ways of working. CESG has brought together its Results of a successful evaluation are published in a assurance services under Information Assurance and Certification Report. This contains additional information and Consultancy Service (IACS) to offer bespoke solutions to advice on how the certified product should be used and any these new security challenges. restrictions that may apply in its configuration or use on specific platforms. In order to be listed in the Directory, a product must have undergone one of the various methods of evaluation and/or Prospective purchase’s of approved products are reminded certification offered by IACS. IACS provides a seamless that the product descriptions in this Directory are only a service for customers and the IACS management office can guide, and that they should consult the supplementary provide more in-depth advice and guidance to developers, documentation before purchasing, to check the product’s vendors and end users on the most appropriate solution to suitability. Prospective purchasers of ITSEC/CC products meet their assurance requirements. should read both the Security Target and Certification Report of the product. These are available from the vender and can THE IACS approach also be downloaded from the CESG website, www.cesg.gov.uk. Prospective purchasers of CAPS products For Developers… should read both the Security Target and Handling Technical assessors from IACS will work with developers Instructions and are also advised to ensure that the intended or end users to define the best solution to their assurance usage, implementation and deployment of a cryptographic requirements. By understanding the developer’s goals, IACS product is in compliance with National Baseline Policy can define the most effective assessment package to detailed in HMG Infosec Standard 4. achieve them. An assessment package could include: • Internationally recognised Common Criteria (CC) or Security Targets for CAPS products are available from the IT Security Evaluation Criteria (ITSEC) Certification vendor and the Handling Instructions are available from • Cryptographic approval for HMG either the vendor or CESG www.cesg.gov.uk. Please note • Tailored Assurance-a toolbox approach to that these documents are often Protectively Marked and systems assurance therefore, available only to recipients with a valid need to know and appropriate storage and handling facilities. © Crown Copyright 2010. This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption under other UK information Legislation. Introduction Page 1.3 What is a Security Target? CONTACT DETAILS This is a document specifying the security functionality of a product and the assurance level against which it is evaluated Customer Support Office as well as a description relating the product to the A2j environment in which it will operate. CESG Hubble Road Vulnerabilities Cheltenham Certification is not a guarantee of freedom from security Gloucestershire vulnerabilities; there remains a possibility that exploitable GL51 0EX vulnerabilities may be discovered after a Certificate has been awarded. Users and prospective purchasers should check Telephone: +44 (0)1242 709 141 regularly whether any security vulnerabilities have been Fax: +44 (0)1242 709 193 discovered since certification and, if appropriate, should check with the vendor to see if any patches exist for the Email: [email protected] product. If so they should test and install the Patch. URL: www.cesg.gov.uK CESG Sales Approvals The sale of any CESG-approved cryptographic product is subject to approval by CESG. This is an important process to ensure that cryptographic products are going to appropriate recipients and to ensure that the implementation of cryptography requested is appropriate to the requirement. It is also an important element of the Key production process, ensuring that users receive appropriate Key material for their requirements. Obtaining Approved Cryptographic Products Contact details for advice on products and for sales enquires are given in the product listing. Communication on CESG telecommunications systems may be monitored or record to secure the effective operation of the system and for other lawful purpose. © Crown Copyright 2010. This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption under other UK information Legislation. Introduction Page 1.4 END USERS ARE STRONGLY URGED TO CHECK WITH CESG THAT BOTH THE PRODUCT AND ITS CRYPTOGRAPHY ARE SUITABLE FOR HMG USE PRIOR TO PURCHASING. ITSEC/CC Prospective purchasers of ITSEC/CC certified products should read both the Security Target and the Certification Report to ensure the product is suitable. These are available from the vendor and in addition can usually be downloaded from CESG website. Prospective purchasers of CAPS approved products are reminded that the product descriptions in the Directory are a guide only, and that they should consult the product’s Security Target and Handling Instructions before purchasing to check the product’s suitability. Security Targets for CAPS products are available from the vendor Prospective purchasers of CCT Mark approved products and the Handling Instructions are available from either or services should read both the ICD and Test Report the vendor or CESG. Please note that these documents documents available from the CCT Mark website, to are often Protectively Marked and therefore available ensure the product or service is appropriate for their only to recipients with a valid need to know and needs. appropriate storage and handling facilities. For further information about other aspects of CESG’s work, please contact: Customer Support Office, CESG, A2j, Hubble Road, Cheltenham, Gloucestershire, GL510EX. Telephone: +44 (0)1242 709141 Fax: +44 (0)1242 709193 .Email: [email protected] © Crown Copyright 2010. Communication on CESG telecommunications systems may be monitored or record to secure the effective operation of the system and for other lawful purpose. This information is exempt from disclosure under the Freedom of Information Act 2000 and may be subject to exemption under other UK information Legislation. Refer disclosure requests to originating Agency Access Control Page 2.1 BeCrypt™ Advanced Port BeCrypt™ Connect Protection Control (APC) Version 3.0 Cryptographic Grade: See Notes CCTM Certificate: 2009/08/0049 Awarded: 4th August 2009 Valid until: 3rd August 2011 BeCrypt™ Advanced Port Control (APC) is a port control solution BeCrypt™ Connect Protect is an access control solution for designed to prevent the connection and use of unauthorised Plug and Play devices designed to protect an enterprise from devices for IBM compatible personal computers running accidental or malicious leakage of private or classified data at Microsoft Windows XP, Windows 2000 Server and Windows
Recommended publications
  • University Microfilms International 300 North Zeeb Road Ann Arbor, Michigan 48106 USA St
    ISOLATION AND COMMUNITY: THE THEME AND FORM OF WILLIAM MORRIS' POETRY AND PROSE Item Type text; Dissertation-Reproduction (electronic) Authors Balch, Dennis Robert, 1949- Publisher The University of Arizona. Rights Copyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author. Download date 09/10/2021 07:25:50 Link to Item http://hdl.handle.net/10150/289550 INFORMATION TO USERS This material was produced from a microfilm copy of the original document. While the most advanced technological means to photograph and reproduce this document have been used, the quality is heavily dependent upon the quality of the original submitted. The following explanation of techniques is provided to help you understand markings or patterns which may appear on this reproduction. 1.The sign or "target" for pages apparently lacking from the document photographed is "Missing Page(s)". If it was possible to obtain the missing page(s) or section, they are spliced into the film along with adjacent pages. This may have necessitated cutting thru an image and duplicating adjacent pages to insure you complete continuity. 2. When an image on the film is obliterated with a large round black mark, it is an indication that the photographer suspected that the copy may have moved during exposure and thus cause a blurred image. You will find a good image of the page in the adjacent frame. 3. When a map, drawing or chart, etc., was part of the material being photographed the photographer followed a definite method in "sectioning" the material.
    [Show full text]
  • MAM VSN Innovation & Media Solutions White Paper
    www.vsn-tv.com [email protected] White Paper VSNExplorer MAM VSN Innovation & Media Solutions White Paper Index 01 _ Introduction 02 _ What is a MAM and how can it help your company? 03 _ Some words on Metadata 04 _ Asset Management through history 05 _ 10+1 requirements of an advanced MAM 06 _ Our MAM: VSNExplorer 07 _ Looking for the perfect MAM 08 _ The Expert’s Opinion: VSN’s CTO 2 VSNExplorer MAM | White Paper VSNExplorer MAM White Paper VSN Innovation & Media Solutions 01 Introduction Nowadays, competitiveness within Broadcast and Media industries has grown to a point where every second is paramount in content creation and production. Therefore, it is impossible to understand the Broadcast, Audiovisual and Media & Entertainment industries without paying attention to one of the most crucial tools to its daily operations: the Media Asset Management (MAM) systems. At VSN we want to offer a general vision on this technology, paying attention to how the rise of new video files, with different formats and aimed at different platforms has created a complex environment that makes it necessary for media companies to correctly manage every media asset and automate repetitive tasks as much as possible in order to increase efficiency and avoid mistakes. VSNExplorer MAM | White Paper 3 VSNExplorer MAM VSN Innovation & Media Solutions White Paper 02 What is a MAM system and how can it help your company? To begin with, let’s first define the concept of a MAM: At this point, to fully understand Media Asset A Media Asset Management (MAM) system is a Management (MAM) technologies, we need to have tool that manages, organizes and catalogues any a clear knowledge of what media assets are and why it is key to have a MAM tool to manage them.
    [Show full text]
  • An Architecture for Cryptography with Smart Cards and NFC Rings on Android
    OpenKeychain: An Architecture for Cryptography with Smart Cards and NFC Rings on Android DOMINIK SCHÜRMANN, TU Braunschweig, Germany SERGEJ DECHAND, University of Bonn, Germany LARS WOLF, TU Braunschweig, Germany While many Android apps provide end-to-end encryption, the cryptographic keys are still stored on the device itself and can thus be stolen by exploiting vulnerabilities. External cryptographic hardware solves this issue, but is currently only used for two-factor authentication and not for communication encryption. In this paper, we design, implement, and evaluate an architecture for NFC-based cryptography on Android. Our high-level API provides cryptographic operations without requiring knowledge of public-key cryptography. By developing OpenKeychain, we were able to roll out this architecture for more than 100,000 users. It provides encryption for emails, messaging, and a password manager. We provide a threat model, NFC performance measurements, and discuss their impact on our architecture design. As an alternative form factor to smart cards, we created the prototype of an NFC signet ring. To evaluate the UI components and form factors, a lab study with 40 participants at a large company has been conducted. We measured the time required by the participants to set up the system and reply to encrypted emails. These measurements and a subsequent interview indicate that our NFC-based solutions are more user friendly in comparison to traditional password-protected keys. CCS Concepts: • Security and privacy → Usability in security and privacy; Key management; Hardware-based security protocols; • Human-centered computing → Mobile devices; Additional Key Words and Phrases: NFC, near-field communication, smart card, ring ACM Reference Format: Dominik Schürmann, Sergej Dechand, and Lars Wolf.
    [Show full text]
  • The World's Show, 1851, Or, the Adventures of Mr. and Mrs
    I < ' ' 6 i-o / Digitized by the Internet Archive in 2017 with funding from Getty Research Institute https://archive.org/details/worldsshow1851or00mayh ^0 mt (S’SS.m : on -n ft mrnfrTTTK^LLuj *t^P^YfTYfTTfM TTTTTjif 111 Hli)HOR, IthfAdvInturesvi V AND M TS SANDBOYS AND FAMILY,, ;0 CAME UP TO TOENJOY THEMSEEVEiS. AND TO SEE THE GREAT BY HENMYMA¥H E.W/MEDI GEORCECrUBCS MANIC. LONDON: GEORGE NEWBOLD, 303 & 304, STRAND, Vv.C. — LIST OF ILLUSTRATIONS DESIGNED AND ETCHED BY GEORGE CRUIKSHANK. ALL THE WORLD GOING TO THE GREAT EXHIBITION Frontispiece LOOKING FOR LODGINGS 54 LONDON CRAMMED AND MANCHESTER DESERTED 2 PLATES . 59 THE OPERA BOXES DURING THE TIME OF THE GREAT EXHIBI- TION 117 THE OPENING OF THE GREAT BEE-HIVE 136 THE FIRST SHILLING DAY 153 SOME OF THE DROLLERIES OF THE GREAT EXHIBITION ... 160 ODDS AND ENDS, IN, OUT, AND ABOUT THE GREAT EXHIBITION . 162 DISPERSION OF THE WORKS OF ALL NATIONS 238 ludia Proof impressions of the above Ten Plates may be had, all printed on paper of uniform size (23^ by 17^ inches), quite perfect, and free from folds, price 15s. per set. ENGRAVINGS. THE CHEAPEST HOUSE FOR ENGRAVINGS OF EVERY DESCRIPTION is GEORGE NEWBOLD’S, 303 & 304, STRAND, LONDON, W.C. (back of st. mart’s chukch.) A Clearance Sale Catalogue, 54 Svo pp., Post Free on receipt of Four Stamps. ; ; 1851 : OB, THE ADVENTURES OF MR. AND MRS. CURSTY SANDBOYS. CHAPTER I. ‘ 1 Come, Nicliol, and gi’e us thy cracks, I seed te gang down to the smiddy, I’ve fodder’d the naigs and—the nowt, And wanted to see thee ’at did e.
    [Show full text]
  • An Expo and So Much More
    e*newsMagazine for the Media Manufacturing Industry Industry.news p2 Business.news p3 Association.news p4 Expo.special p5 May 8, 2006 www.media-tech.net Introduction Frankfurt - an Expo and so much more Looking ahead The Expo in Frankfurt will be an exciting and the delegates. At a time when business is The Expo in Frankfurt is less than event. Reports from the exhibitors is that there just beginning to revive, the exhibition, the party, a month away and like yourselves, is going to be lot of new product for driving the Daily magazine, the comprehensive seminar/ we are working hard here on the forward CD and DVD production and, of course, workshop program are all there to make the Frank- preparations for the event. for Blu-ray and HD DVD. furt Expo an important event for you commercially, SPECIAL EDITION socially and for gathering information. The MEDIA- An important part of the Expo is Both the new formats will be well represented TECH Expo is being held at the Frankfurt Messe always the Association Meeting which on the floor of the Exhibition and in the work- on May 30 to June 1, 2006. is held the night before the opening shops and seminars. The active participation of the Full details at http://www.media-tech.net of the show and this year includes Blu-ray Disc Association, the DVD Forum and the elections for new Board Members. the HD DVD Promotion Group all point to the There are two positions open for elec- importance that the broader industry places on the tion or re-election.
    [Show full text]
  • Scenarist Designer PS Brochure
    SONIC® AUTOMATING THE PROFESSIONAL DVD WORKFLOW DESIDESIGNERGNER ADVANCED INTERACTIVE DESIGN FOR BLU-RAY DISC AND HD DVD Scenarist® Designer PS generates optimized graphics for both Blu-ray Disc and HD DVD. Putting designers in control of the interactive layout, Scenarist Designer PS enables designers to design once for both formats, eliminating layout errors, and delivering a fast and efficient HD DVD and Blu-ray Disc production workflow. ADVANCED INTERACTIVE DESIGN FOR BLU-RAY DISC AND HD DVD Scenarist Designer PS is a Photoshop® Plug-in that automatically generates optimized graphics for both Blu-ray Disc and HD DVD. Putting designers in control of interactive layout, Scenarist Designer PS enables designers to design once for both formats, eliminating layout errors when designs are passed to authors. Designed to seamlessly integrate with both Adobe® Photoshop® and the Scenarist Workgroup, Scenarist Designer PS enables the fastest and most efficient design-to-author workflow possible for HD DVD and BD. Featuring exclusive optimization algorithms and support for both Windows® and Mac OS X, Scenarist Designer PS is the design tool that every HD DVD and Blu-ray Disc designer can’t afford to be without. Automated Graphics Optimization for the Next- Seamless Adobe® Photoshop® Integration Generation Formats Scenarist Designer PS enables designers to optimize their graphics for HD Automatically create optimized graphics for your chosen format without having DVD and Blu-ray Disc without leaving Photoshop. With no extra programs to to understand
    [Show full text]
  • Security Industry Monitor March 2014
    Security Industry Monitor March 2014 For additional information on our Security Team, please contact: John E. Mack III Co-head, Investment Banking Group Head of Mergers and Acquisitions (310) 246-3705 [email protected] Michael McManus Managing Director, Investment Banking Group (310) 246-3702 [email protected] PLEASE SEE IMPORTANT DISCLOSURES ON LAST PAGE About Imperial Capital, LLC Imperial Capital is a full-service investment bank offering a uniquely integrated platform of comprehensive services to institutional investors and middle market companies. We offer sophisticated sales and trading services to institutional investors and a wide range of investment banking advisory, capital markets and restructuring services to middle market corporate clients. We also provide proprietary research across an issuer’s capital structure, including bank debt, debt securities, hybrid securities, preferred and common equity and special situations claims. Our comprehensive and integrated service platform, expertise across the full capital structure, and deep industry sector knowledge enable us to provide clients with superior advisory services, capital markets insight, investment ideas and trade execution. We are quick to identify opportunities under any market conditions and we have a proven track record of offering creative, proprietary solutions to our clients. Imperial Capital’s expertise includes the following sectors: Aerospace, Defense & Government Services, Airlines & Transportation, Business Services, Consumer, Energy (Clean Energy and Traditional Energy), Financial Services, Gaming & Leisure, General Industrials, Healthcare, Homebuilding & Real Estate, Media & Telecommunications, Security & Homeland Security and Technology. Imperial Capital has three principal businesses: Investment Banking, Institutional Sales & Trading and Institutional Research. For additional information, please visit our Web site at www.imperialcapital.com.
    [Show full text]
  • Encryption Block Cipher
    10/29/2007 Encryption Encryption Block Cipher Dr.Talal Alkharobi 2 Block Cipher A symmetric key cipher which operates on fixed-length groups of bits, termed blocks, with an unvarying transformation. When encrypting, a block cipher take n-bit block of plaintext as input, and output a corresponding n-bit block of ciphertext. The exact transformation is controlled using a secret key. Decryption is similar: the decryption algorithm takes n-bit block of ciphertext together with the secret key, and yields the original n-bit block of plaintext. Mode of operation is used to encrypt messages longer than the block size. 1 Dr.Talal Alkharobi 10/29/2007 Encryption 3 Encryption 4 Decryption 2 Dr.Talal Alkharobi 10/29/2007 Encryption 5 Block Cipher Consists of two algorithms, encryption, E, and decryption, D. Both require two inputs: n-bits block of data and key of size k bits, The output is an n-bit block. Decryption is the inverse function of encryption: D(E(B,K),K) = B For each key K, E is a permutation over the set of input blocks. n Each key K selects one permutation from the possible set of 2 !. 6 Block Cipher The block size, n, is typically 64 or 128 bits, although some ciphers have a variable block size. 64 bits was the most common length until the mid-1990s, when new designs began to switch to 128-bit. Padding scheme is used to allow plaintexts of arbitrary lengths to be encrypted. Typical key sizes (k) include 40, 56, 64, 80, 128, 192 and 256 bits.
    [Show full text]
  • Autumn 99 President: Eric Mitchell
    Auiunui vy DARK PEAK NEWS Autumn 99 President: Eric Mitchell Chairman Cub Captain 3 News Dave Holmes Vacant 615 Loxley Road Loxley 5 Coining Events Sheffield S6 6RR Tel. (0114) 2344186 8 More News Secretary Treasurer Paul Sanderson Jeff Harrison 19 Findon Street 118 Lydgate Lane Hillsborough Crookes 9 Letters Sheffield Sheffield S6 4FG S10 5FP Tel. (0114) 2206353 Tel. (0114) 2687114 11 Features - Warts winter 98/99 Clothing & Equipment Membership - Training weekend Richard Hakes Tim Tett - Getting the Horns 454A Loxley Road 68 Roebuck Road - Thoughts on Access Loxley Sheffield S6 2XA Sheffield S6 6RS Tel.(0114) 2667922 Tel. (0114) 2339912 18 Going the Distance - Central Fells in a day Cross Country - Bob Graham 99 Pete Dyke 13 Falkland Road Sheffield Sll 7PL 21 Reports and Results Tel. (0114) 266280 41 Fell Off Editor Mike Pedley 43 In Press Frost Hole Farm - Inside the New Map Cragg Vale Hebden Bridge HX7 5RU 43 In Gear Tel. (01422) 886195 email: [email protected] .co. uk 44 The-bit-at-the-end 2 Autumn 99 Club Hut Condemmed Plans to renovate the club hut were stopped in their tracks when serious structural problems were discovered during a close inspection of the building. The findings suggested the hut could collapse at any time and left club officials with no option other than declare a return to the car park changing at the Sportsman on a Wednesday night. Roy Small and Hugh Cotton's appeal for funds has been put on hold whilst discussion are held into possibilities for a replacement. The hut was moved following the closure of the nearby prisoner of war camp in 1945 and is possibly the last remaining building from the site.
    [Show full text]
  • DIG: Digital Media Tech 1
    DIG: Digital Media Tech 1 DIG 2101C. ADVANCED WEB ESSENTIALS. 3 2 1 DIG: DIGITAL MEDIA TECH ADVANCED WEB ESSENTIALS Prerequisite: Minimum grades of C in DIG 2100C and either DIG 2000C or GRA 1142C; or department approval Courses Credit(s) Contact Lab Students will learn about cross-browser compatibility, the terminology of DIG 1102C. INTRODUCTION TO WEB 3 3 1 internet systems, and advanced CSS techniques. (Special Fee: $48.00). PROGRAMMING. DIG 2106C. ADVANCED CLIENT-SIDE 3 3 1 INTRODUCTION TO WEB PROGRAMMING Covers basic programming PROGRAMMING. knowledge applied to front-end web technology with a focus on a current ADVANCED CLIENT-SIDE PROGRAMMING Pre-requisite: Minimum web programming language. (Special Fee: $48.00). grade of C in DIG 2180C or department approval. Covers event-driven DIG 1108C. INTRODUCTION TO SERVER-SIDE 3 3 1 programming, manipulating the Document Object Model, client-side PROGRAMMING. event handling, and HTML forms with an industry-standard JavaScript INTRODUCTION TO SERVER-SIDE PROGRAMMING Prerequisites: framework. (Special Fee: $59.00). Minimum grade of C in DIG 1102C or department approval. Covers basic DIG 2107C. ADVANCED SERVER-SIDE 3 3 1 programming knowledge applied to back-end web technology with a PROGRAMMING. focus on a current web programming language. (Special Fee: $59.00). ADVANCED SERVER-SIDE PROGRAMMING Prerequisites: Minimum DIG 1452C. ANNOUNCING AND PERFORMANCE 3 2 2 grade of C in DIG 1940; AND minimum grade of C in either DIG 1108C or FOR MULTIMEDIA. COP 1000; AND minimum grade of C in either DIG 2100C or COP 2282; ANNOUNCING AND PERFORMANCE FOR MULTIMEDIA An introduction or department approval Covers the interaction of client requests over to the techniques, practices and procedures in recorded and live event the internet, web services (PHP, HTML, HTTP) Business Objects and performance.
    [Show full text]
  • DIRECTORY of INFOSEC ASSURED PRODUCTS 2001 CESG DIRECTORY 14/5/01 3:48 Pm Page 2
    CESG DIRECTORY 14/5/01 3:48 pm Page 1 DIRECTORY OF INFOSEC ASSURED PRODUCTS 2001 CESG DIRECTORY 14/5/01 3:48 pm Page 2 CONTENTS INTRODUCTION Page 3-4 IACS Introduction to CESG Infosec Assurance and Certification Services Page 5-8 CLEF Contact Details Page 9 International Certification Body Contact Details Page 9 CC and ITSEC Certified Products • Smart Cards Page 10 • PC Access Control Page 11-13 • Operating Systems Page 14-18 • Networking Page 19-24 • Firewalls Page 24-31 • Communications Page 32-37 • Databases Page 38-43 • Miscellaneous Page 43-44 PROTECTION PROFILES Introduction to Protection Profiles Page 45 List of Protection Profiles products Page 46-49 CAPS Introduction to CESG Approved Products Scheme Page 51-52 CAPS products • Data Encryption Page 53-55 • Communications Security Page 55-57 • Access Control Page 58-61 • Miscellaneous Page 62 TEMPEST Introduction to Tempest Page 63 List of Tempest approved products Page 64-66 Company names and addresses Page 67-68 INDEX Page 69-70 2 CESG DIRECTORY 14/5/01 3:48 pm Page 3 INTRODUCTION This ‘Directory of Infosec Assured Products’ is a new publication that replaces the former UKSP-06. It has been produced as a top-level guide for both product developers, vendors and end-users, and gives details of the means by which security products are approved or certified, an overview of the products’ features, and the context in which they should be used. The Directory will be updated on an annual basis. However, as new products are regularly being approved and certified, these will be reflected on CESG’s websites, accessible via www.cesg.gov.uk, as and when they become available.
    [Show full text]
  • Ghostscript Wrapper for C:\Documents and Settings\Owner\Desktop\Tasks
    Potential Misuse of NFC Enabled Mobile Phones with Embedded Security Elements as Contactless Attack Platforms Lishoy Francis, Gerhard Hancke, Keith Mayes and Konstantinos Markantonakis The Information Security Group, Smart Card Centre, Royal Holloway University of London, Egham Hill, TW20 0EX, Surrey, United Kingdom. Email: {L.Francis, Gerhard.Hancke, Keith.Mayes, K.Markantonakis}@rhul.ac.uk Abstract a turnstile, and the opportunity for a single device to con- tain multiple tokens. The NFC devices can also be used as a In this paper we investigate the possibility that a Near contactless reader that interacts with a variety of contactless Field Communication (NFC) enabled mobile phone, with “smart objects”. For example, a customer could initiate the an embedded Secure Element (SE), could be used as a mo- process to buy a cinema ticket by touching his NFC mobile bile token cloning and skimming platform. We show how an phone against a smart movie poster. More details on the attacker could use a NFC mobile phone as such an attack potential of NFC technology can be found in [2]. platform by exploiting the existing security controls of the Up to now, contactless transactions have been well re- embedded SE and the available contactless APIs. To illus- ceived by merchants and customers due to their inherent trate the feasibility of these actions we also show how to benefits such as ease of use, quick transaction time and lim- practically skim and emulate certain tokens typically used ited maintenance requirements. However, the increased use in payment and access control applications with a NFC mo- of mobile phones in contactless transactions could provide bile phone.
    [Show full text]