Relacionar Columnas Security EvaluationVersión en línea Computer System Security Chapter 11 por Aidora Abdullah 1 TCSEC 2 EAL 1 3 Method of Evaluation 4 Protection Profile 5 Assurance 6 Cryptographic Modules, Security Levels 7 Purpose of Evaluation 8 Trusted Execution Environment 9 EAL 7 10 Functionality 11 Evaluation Assurance Level (EAL) 12 Common Criteria 13 Target of Evaluation 14 Security Target 15 ITSEC A reusable set of security requirements. An example of Data Protection, Protection Profile. Evaluation should not miss problems / different evaluations of the same product should give the same results. formally verified, designed and tested. Product/System has the security properties claimed, is suitable for a given application, and is accredited. Implementation-dependent statement of security needs for a specific identified TOE. European security evaluation criteria separating functionality and assurance. An example of a Trusted Computing Protection Profile. Defines what has to be done in an evaluation. Software has to meet generic security requirements; OR system meets specific security requirements of a given application. Security evaluation criteria for US Defense sector. System provides adequate for meeting a user's concrete security requirements. An international set of specifications and guidelines designed to evaluate information security products and systems. Functionally tested. The security services have been implemented properly so that the user can rely on them.