First Sentence: Security requirements for compliance with C-2 criteria.
C2 security is usually recounted as discretionary get access to security. Many C2 characteristics will appear obvious. Here are a couple of the obligations of a C2-evaluated product:
Each client should have a exclusive logon ID and a password, which they should go in before they can get access to the system. The user's logon ID and password should be defended from arrest or eavesdropping.
The Windows NT logon dialog initiation keyboard sequence (Ctrl+Alt+Del) is the first line of protecting against Trojan Horse programs that search to rob a user's ID and ...