answersLogoWhite

0

Trusted Operating System (TOS) generally refers to an operating system that provides sufficient support for multilevel security and evidence of correctness to meet a particular set of government requirements.

The most common set of criteria for trusted operating system design is the Common Criteria combined with the Security Functional Requirements (SFRs) for Labeled Security Protection Profile(LSPP) and Mandatory Access Control(MAC). The Common Criteria is the result of a multi-year effort by the governments of the U.S., Canada, United Kingdom, France, Germany, the Netherlands and other countries to develop a harmonized security criteria for IT products.

Examples of certified trusted operating systems are:

Apple Mac OS X 10.6 (Rated EAL 3+)

HP-UX 11i v3 (Rated EAL 4+)

Some Linux distributions (Rated up to EAL 4+)

Microsoft Windows 7 and Microsoft Server 2008 R2 (Rated EAL 4+)

AIX 5L with PitBull Foundation (Rated EAL 4+)

Trusted Solaris

Trusted UNICOS 8.0 (Rated B1)

XTS-400 (Rated EAL5+)

User Avatar

Wiki User

11y ago

What else can I help you with?

Related Questions

What Operating System Do Spies Use?

Well i don't know any spies but i put my bets on them having custom distros of linux that they have modified to the security they need. If not then they will probably use a security evaluated operating system e.g Trusted Solaris.


What is the difference between operating system security and network security?

operating system security concerns about vulnerabilities on specific operating system network system security concerns about vulnerabilities of the entire network regrdless how diverse or complex the network is.


How do you get an operating system pact to rectify a potential break of system security?

HOW DO I GET AN OPERATING SYSTEM patch to rectify a potential of system of security


What is the difference between a network operating system and operating system security?

Network security concentrates on the packets of information flowing between computer systems.Operating System security controls access to resources on the server itself.Therefore, the two are looking at different things in terms of security.


Give you five major achievement of operating system?

The five major achievements of operating system are in the areas of Process Memmory Management Information protection and security Scheduling and Resource management System Structure


What security features of the operating system can be used to simplify the design of the database management system?

A)What security features of the operating system can be used to simplify the design of the database management system?


Is availabillity a trusted information system?

Availability is one of the key pillars of information security, alongside confidentiality and integrity. A trusted information system ensures that data and services are consistently available to authorized users when needed, following established policies and procedures to prevent disruptions and downtime. Therefore, maintaining availability is essential for a system to be considered trustworthy.


Difference between network and operating system security?

Network security concentrates on the packets of information flowing between computer systems.Operating System security controls access to resources on the server itself.Therefore, the two are looking at different things in terms of security.


Where can you stored a security descriptor?

A security descriptor can be stored as part of an object's metadata in an operating system, such as in the file system for files and folders or in the registry for registry keys. It contains information about the security attributes of the object, such as the owner, permissions, and auditing settings.


Information about the latest operating system?

i want information on LATEST operating system but this is giving me just useless things


What is system integrity management?

An operating system is said to have system integrity when it is designed, implemented and maintained to protect itself against unauthorized access, and does so to the extent that security controls specified for that system cannot be compromised. A multilevel-secure trusted computing base ensures system integrity.


What is the demands of network operating system?

The demands of a network operating system are to be able to share resources, and ensure network security.