Showing 13 - 24 of 32
International Certification Authorities for Trusted Computing

International Certification Authorities for Trusted Computing

This white paper provides an overview of the international government agencies that perform security accreditation for network switches, storage devices, and ruggedized computers used in military applications.

07/02/2020
Meeting Cyber Situational Awareness and NetOps Challenges with PacStar IQ-Core Software White Paper

Meeting Cyber Situational Awareness and NetOps Challenges with IQ-Core Software

NetOps and Cyber SA demand rapid and continuous innovation to meet evolving threats to DoD information dominance.

06/25/2020
Certification Authorities for Trusted Computing in Military and Avionics Products

Certification Authorities for Trusted Computing in Military and Avionics Products

This white paper provides an overview of certification authorities involved in Trusted Computing, explores which disciplines they oversee, and gives guidance on when to get these certification authorities involved.

06/25/2020
CSfC Series: Data-at-Rest Capability Package 4.8

CSfC Series: Data-at-Rest Capability Package 4.8

The CSfC data-at-rest (DAR) capability package has evolved over the last five to six years. Starting with the initial draft version 0.8 in July 2014, the DAR CP has matured as expected with the ever-increasing CSfC-based storage applications in the field.

05/06/2020
Establishing a Trusted Supply Chain

Establishing a Trusted Supply Chain

This paper examines the best practices commercial off-the-shelf (COTS) hardware vendors must employ to establish a trusted supply chain, including managing obsolescence, counterfeit parts mitigation, secure manufacturing, and design integrity.

04/22/2020
Decomposing System Security Requirements

Decomposing System Security Requirements

This white paper guides decomposing system security requirements and mapping a security plan to physical components to build a truly trusted system.

03/11/2020
Choosing the Best Location for Your Data-At-Rest Encryption Technology

Choosing the Best Location for Your Data-At-Rest Encryption Technology

The choice of encryption location can determine how difficult it is for adversaries to decrypt sensitive data and use it to their advantage.

11/20/2019
The Impact of Protecting I/O Interfaces on System Performance

The Impact of Protecting I/O Interfaces on System Performance

A trusted computing system can ensure security at the potentially vulnerable entry points of system interfaces, yet this may compromise performance through design trade-offs that systems designers must compensate for.

06/11/2019
Developing a Secure COTS-Based Trusted Computing System

Developing a Secure COTS-Based Trusted Computing System

System-level security is more than simply the sum of its parts. Read about key protections that must be considered when developing a secure COTS-based Trusted Computing system.

03/29/2019
Application Development, Testing, and Analysis for Optimal Security

Trusted Computing White Paper: Application Development, Testing, and Analysis for Optimal Security

We explore securing data transfer, performing testing, and leveraging existing processor features for trusted and secure application software.

02/21/2019
Beyond Trusted Computing

Beyond Trusted Computing

Read the white paper by Curtiss-Wright TCOTS experts and learn about our holistic approach to Trusted Computing that applies rigorous protection standards at every stage of the development process.

12/12/2018
Considering the Role of Hardware in Securing OS and Hypervisor Operation

Considering the Role of Hardware in Securing OS and Hypervisor Operation

This white paper by David Sheets explores the role that hardware plays in ensuring the security of operating systems (OS) and hypervisors.

11/28/2018