Browsing by Subject "National Computer Security Center (NCSC)"
Now showing 1 - 6 of 6
- Results Per Page
- Sort Options
Item Oral history interview with Daniel J. Edwards(Charles Babbage Institute, 2013-07-02) Edwards, Daniel J.In this oral history, computer security pioneer Daniel Edwards discusses his long-term career as a computer security researcher at the National Security Agency (NSA). He discusses Trojan Horse attacks, a term he introduced in the computer security field to describe a particular type of computer security vulnerability of hidden malicious code within a seemingly harmless program. He provides perspective on the evolving relationship of communications security (COMSEC) and computer security (COMPUSEC) at the NSA. Edwards became part of the NSA’s National Computer Security Center and was principally involved with the development of the NCSC’s/DOD’s Trusted Computer System Evaluation Criteria (TCSEC) and elaborates on the processes and considerations in developing and refining this influential set of computer security standards. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”Item Oral history interview with Lance Hoffman by Rebecca Slayton(Charles Babbage Institute, 2014-07-01) Hoffman, LanceThis interview with security pioneer Lance Hoffman discusses his entrance into the field of computer security and privacy—including earning a B.S. in math at the Carnegie Institute of Technology, interning at SDC, and earning a PhD at Stanford University—before turning to his research on computer security risk management at as a Professor at the University of California–Berkeley and George Washington University. He also discusses the relationship between his PhD research on access control models and the political climate of the late 1960s, and entrepreneurial activities ranging from the creation of a computerized dating service to the starting of a company based upon the development of a decision support tool, RiskCalc. Hoffman also discusses his work with the Association for Computing Machinery and IEEE Computer Society, including his role in helping to institutionalize the ACM Conference on Computers, Freedom, and Privacy. The interview concludes with some reflections on the current state of the field of cybersecurity and the work of his graduate students. This interview is part of a project conducted by Rebecca Slayton and funded by an ACM History Committee fellowship on “Measuring Security: ACM and the History of Computer Security Metrics.”Item Oral history interview with Marvin Schaefer(Charles Babbage Institute, 2013-11-20) Schaefer, MarvinThis interview with computer security pioneer Marvin Schaefer discusses his roles and perspectives on computer security work at the System Development Corporation over many years (an organization he began working at in the summer of 1965), as well as his work at the National Computer Security Center in helping to create the Trusted Computer System Evaluation Criteria (TCSEC). With the latter he relates the challenges to writing the criteria, the debates over the structure and levels, and the involvement of criteria lawyers. He also summarizes his work at the company Trusted Information Systems. In addition to detailing his pivotal work in computer security, he offers insightful commentary on issues in the field such as the Bell-LaPadula Model, John McLean’s System Z, and other topics. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”Item Oral history interview with Roger R. Schell(Charles Babbage Institute, 2012-05-01) Schell, Roger R.Dr. Roger R. Schell, a retired U.S. Air Force Colonel and current president of Æsec Corporation, is one of the foremost contributors to and authorities on "high assurance" computer security. In this oral history he discusses his formulation of the secure kernel and reference monitor concepts (in the early 1970s), his work that led to security enhancements to Honeywell-Multics (mid-1970s), his role as deputy director of the National Computer Security Center (including leadership on TCSEC or “The Orange Book” in the early to mid-1980s), and commercial (high assurance) computer security enterprises he’s led since retiring from the Air Force. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”Item Oral history interview with Sheila Brand by Rebecca Slayton(Charles Babbage Institute, 2016-09-29) Brand, SheilaThis interview with security pioneer Sheila Brand discusses her early training and career in mathematics and engineering before turning to her work in both private sector and government computer security. In the late 1960s and early 1970s, Brand helped to develop and secure time-shared databases at Commercial Credit Corporation, shortly after Commercial Credit merged with Control Data Corporation (CDC). In the 1970s Brand worked on computer security in the Social Security Administration and the Inspector General’s office of the Department of Health and Human Services before going to the National Security Agency’s new Computer Security Center in 1982. There she authored the Trusted Computer System Evaluation Criteria (TCSEC), or “Orange Book,” which influenced computer security standards around the world. In her later career at the National Security Agency she worked in intelligence as well as continued standards development, for example leading the task force that developed the Unified INFOSEC Criteria. Brand also discusses the processes whereby she overcame multiple obstacles to women pursuing careers in science and engineering, and the process of becoming a manager as well as a problem-solver. This interview is part of a project conducted by Rebecca Slayton and funded by an ACM History Committee fellowship on “Measuring Security: ACM and the History of Computer Security Metrics.”Item Oral history interview with Terry Benzel(Charles Babbage Institute, 2014-11-18) Benzel, TerryComputer security pioneer Terry Benzel discusses her education and programming work at Charles Draper Laboratory, before focusing on her work at MITRE Corporation, Trusted Information Systems (TIS), Network Associates and USC Information Sciences Institute (ISI). The MITRE discussion highlights her early role and perspectives on criteria evaluation (including her role in the SCOMP evaluation) in the formative years of TCSEC and after the publication of the criteria in 1983. Starting as a TIS principal scientist she rose to become a vice president in charge of the West Coast (Los Angeles) office, and later led a research team of 120 scientists/engineers for Network Associates. Among the technologies discussed are firewall development, and the security testbed at ISI. This material is based upon work supported by the National Science Foundation under Grant No. 1116862, “Building an Infrastructure for Computer Security History.”