A computer security subsystem is defined, herein, as
hardware, firmware and/or software which can be added
to a computer system to enhance the security of the
overall system. A subsystem''s primary utility is to
increase the security of a computer system.The system
that the subsystem is to protect is referred to as
the protected computer system Interpretation. When
corporate into a computer system environment,
evaluated computer security subsystems may be very
effective in reducing or eliminating certain types of
vulnerabilities whenever entire evaluated systems are
unavailable or impractical.The product evaluation
type is done by the National Computer Security Center
through the Trusted Product Evaluation Process using
this interpretation for subsystems. The expanding
growth and complexity of communication networking,
and the risks presented by a new breed of skillful
hackers, serious security threats are an unfortunate
certainty within the highly interconnected office
environment of now days. These threats are very
common and the results are costly to those businesses
that have been affected. Apparently the victims
aren''t entirely at random which is often assumed to
be the case
hardware, firmware and/or software which can be added
to a computer system to enhance the security of the
overall system. A subsystem''s primary utility is to
increase the security of a computer system.The system
that the subsystem is to protect is referred to as
the protected computer system Interpretation. When
corporate into a computer system environment,
evaluated computer security subsystems may be very
effective in reducing or eliminating certain types of
vulnerabilities whenever entire evaluated systems are
unavailable or impractical.The product evaluation
type is done by the National Computer Security Center
through the Trusted Product Evaluation Process using
this interpretation for subsystems. The expanding
growth and complexity of communication networking,
and the risks presented by a new breed of skillful
hackers, serious security threats are an unfortunate
certainty within the highly interconnected office
environment of now days. These threats are very
common and the results are costly to those businesses
that have been affected. Apparently the victims
aren''t entirely at random which is often assumed to
be the case