HSC
Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Articles > TAFIM - Technical Architecture Framework for Information Management
Go to: HSC Trainings
Search:  
Version française
   Services   
o Skills & Expertise
o Consulting
o ISO 27001 services
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o ARJEL
o Training courses
o E-learning
   Conferences   
o Agenda
o Past events
o Tutorials
   Resources   
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
   Company   
o Hervé Schauer
o Team
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
 communication
 
 
o HSC Newsletter
o Press review
o Press releases
o Publications
   Contacts   
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|TAFIM
Technical Architecture Framework for Information Management  
> Access to the content HTML HTML version
TXT Text version [73KB]
PDF PDF version [249KB]
PS PostScript version [100KB]  
> Description Presentation of the DoD security architecture for information systems.  
> Context & Dates Study and lecture made as part of an involvement in the POSIX standardization group at the AFNOR.
5 May 1997 
> Author Tristan Debeaupuis 
> Type  
> Abstract &
Table of content
TAFIM (Technical Architecture Framework for Information Management) is an information security architecture model designed by the DISA (Defense Information Systems Agency), an agency which belongs to the DoD (Department of Defense of the United States). This model is mandatory within the DoD. It has been taken up by X/Open as a reference model for open systems. The only modifications introduced by X/Open deal with publication, there is no modification of the documents' content. This document is a summary of the 1500 pages that describe TAFIM V2.0, with a special attention to the DGSA (DoD Goal Security Architecture), the security target architecture chosen by the DoD.  
> Related documents
themeSecurity Architectures
[Presentation]  DNS Finger - Sharing identity via the DNS [7 June 2012 - French]
[Presentation]  Industrial control systems security. Scadastrophe... or not. [15 May 2012 - French]
[Presentation]  Multi-layers in depth security [19 March 2011 - French]
[Article]  Évolution des attaques de type Cross Site Request Forgery [1 June 2007 - French]
[Presentation]  Tunnels detection at network border [2 June 2006 - French]
[Article]  Détection de tunnels aux limites du périmètre [2 June 2006 - French]
[Presentation]  How to make one's Internet security [5 January 2002 - French]
[Presentation]  Security architecture for connecting to the Internet [18 December 2001 - French]
[Article]  How to set up security systems? [29 March 2001 - French]
[Presentation]  How to insert VPNs in existing security architectures? [29 September 1999 - French]
[Article]  How to build a secure Internet access architecture? [October 1995 - French]
> Copyright © 1997, Hervé Schauer Consultants, all rights reserved.

 

Last modified on 23 October 2002 at 12:04:44 CET - webmaster@hsc.fr
Information on this server - © 1989-2013 Hervé Schauer Consultants