Virtual Private Networks. CS-480b Dick Steflik. Virtual Private Networks (VPNs). Used to connect two private networks together via the Internet Used to connect remote users to a private network via the Internet
PowerPoint Slideshow about 'Virtual Private Networks' - marcos
An Image/Link below is provided (as is) to download presentation
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
U.S. Government initiative originated to meet the security testing needs of both information technology (IT) consumers and producers.
NIAP is a collaboration between the National Institute of Standards and Technology (NIST) and the National Security Agency (NSA)
in fulfilling their respective responsibilities under PL 100-235 (Computer Security Act of 1987).
combines the extensive IT security experience of both agencies to promote the development of technically sound security requirements for IT products and systems and appropriate measures for evaluating those products and systems.
The long-term goal of NIAP is to help increase the level of trust consumers have in their information systems and networks through the use of cost-effective security testing, evaluation, and validation programs. In meeting this goal, NIAP seeks to:
Promote the development and use of evaluated IT products and systems;
Champion the development and use of national and international standards for IT security;
Foster research and development in IT security requirements definition, test methods, tools, techniques, and assurance metrics;
Support a framework for international recognition and acceptance of IT security testing and evaluation results; and
Facilitate the development and growth of a commercial security testing industry within the U.S.
focus of the CCEVS is to establish a national program for the evaluation of information technology products for conformance to the International Common Criteria for Information Technology Security Evaluation.