SWIPSY
SWIPSY was a firewall toolkit produced by the Defence Evaluation and Research Agency in the UK (later QinetiQ). The SWIPSY toolkit was an ITSEC E3 (equivalent to Common Criteria EAL4) evaluated product that allowed additional code to be added to its security ‘compartments’ without affecting the evaluation status of the toolkit itself. SWIPSY had security properties that assured network and process separation. In particular processes communicating with one network could not communicate directly with the other network other than by ‘trusted mover agents’ that in turn force data to be passed to the format and content checkers. SWIPSY ran on a Trusted Solaris 8 platform, utilising its Mandatory Access Controls to enforce separation between compartments. SWIPSY, which stood for SWitch IP SecurelY, was used to build an SNMP firewall system called MIDASS. SWIPSY technology was licensed by Clearswift for use in its Deep-Secure line of guard products. SWIPSY was used as the basi ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Guard (information Security)
In information security, a guard is a device or system for allowing computers on otherwise separate networks to communicate, subject to configured constraints. In many respects a guard is like a firewall (computing), firewall and guards may have similar functionality to a gateway (telecommunications), gateway. Whereas a firewall is designed to limit traffic to certain services, a guard aims to control the information exchange that the network communication is supporting at the business level. Further, unlike a firewall a guard provides assurance that it is effective in providing this control even under attack and failure conditions. A guard will typically sit between a protected network and an external network, and ensure the protected network is safe from threats posed by the external network and from leaks of sensitive information to the external network. A guard is usually dual-homed, though guards can connect more than two networks, and acts as a full application layer proxy, ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Firewall (computing)
In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet. History The term '' firewall'' originally referred to a wall intended to confine a fire within a line of adjacent buildings. Later uses refer to similar structures, such as the metal sheet separating the engine compartment of a vehicle or aircraft from the passenger compartment. The term was applied in the late 1980s to network technology that emerged when the Internet was fairly new in terms of its global use and connectivity. The predecessors to firewalls for network security were routers used in the late 1980s. Because they already segregated networks, routers could apply filtering to packets crossing them. Before it was used in real-life computing, the term appeared in the 1983 computer-hacking movie ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Defence Evaluation And Research Agency
The Defence Evaluation and Research Agency (DERA) was a part of the UK Ministry of Defence (MoD) between 1995 and 2 July 2001. At the time it was the United Kingdom's largest science and technology organisation. It was regarded by its official history as 'a jewel in the crown' of both government and industry.Eds. Robert Bud and Philip Gummett, ''Cold War Hot Science: Applied Research in Britain's Defence Laboratories 1945-1990'', Harwood, 1999 Formation and operation DERA was formed in April 1995 as an amalgamation of: * Defence Research Agency (DRA) which was set up in April 1991 and comprised ** Royal Aerospace Establishment (RAE) **Admiralty Research Establishment (ARE) ** Royal Armament Research and Development Establishment (RARDE) ** Royal Signals and Radar Establishment (RSRE) * Defence Test and Evaluation Organisation (DTEO) * Chemical and Biological Defence Establishment (CBDE at Porton Down), which became part of the Protection and Life Sciences Division (PLSD) * ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Solaris (operating System)
Solaris is a proprietary Unix operating system originally developed by Sun Microsystems. After the Sun acquisition by Oracle in 2010, it was renamed Oracle Solaris. Solaris superseded the company's earlier SunOS in 1993, and became known for its scalability, especially on SPARC systems, and for originating many innovative features such as DTrace, ZFS and Time Slider. Solaris supports SPARC and x86-64 workstations and servers from Oracle and other vendors. Solaris was registered as compliant with the Single UNIX Specification until 29 April 2019. Historically, Solaris was developed as proprietary software. In June 2005, Sun Microsystems released most of the codebase under the CDDL license, and founded the OpenSolaris open-source project. With OpenSolaris, Sun wanted to build a developer and user community around the software. After the acquisition of Sun Microsystems in January 2010, Oracle decided to discontinue the OpenSolaris distribution and the development model ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Mandatory Access Control
In computer security, mandatory access control (MAC) refers to a type of access control by which the operating system or database constrains the ability of a ''subject'' or ''initiator'' to access or generally perform some sort of operation on an ''object'' or ''target''. In the case of operating systems, a subject is usually a process or thread; objects are constructs such as files, directories, TCP/ UDP ports, shared memory segments, IO devices, etc. Subjects and objects each have a set of security attributes. Whenever a subject attempts to access an object, an authorization rule enforced by the operating system kernel examines these security attributes and decides whether the access can take place. Any operation by any subject on any object is tested against the set of authorization rules (aka ''policy'') to determine if the operation is allowed. A database management system, in its access control mechanism, can also apply mandatory access control; in this case, the objects ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |