Relacionar Columnas Security EvaluationVersión en línea Computer System Security Chapter 11 por Aidora Abdullah 1 TCSEC 2 Trusted Execution Environment 3 Functionality 4 EAL 1 5 Assurance 6 Evaluation Assurance Level (EAL) 7 ITSEC 8 Protection Profile 9 Purpose of Evaluation 10 EAL 7 11 Target of Evaluation 12 Security Target 13 Common Criteria 14 Cryptographic Modules, Security Levels 15 Method of Evaluation An example of a Trusted Computing Protection Profile. The security services have been implemented properly so that the user can rely on them. A reusable set of security requirements. System provides adequate for meeting a user's concrete security requirements. An international set of specifications and guidelines designed to evaluate information security products and systems. Security evaluation criteria for US Defense sector. European security evaluation criteria separating functionality and assurance. An example of Data Protection, Protection Profile. Evaluation should not miss problems / different evaluations of the same product should give the same results. Product/System has the security properties claimed, is suitable for a given application, and is accredited. Software has to meet generic security requirements; OR system meets specific security requirements of a given application. formally verified, designed and tested. Defines what has to be done in an evaluation. Implementation-dependent statement of security needs for a specific identified TOE. Functionally tested.