Relacionar Columnas Security EvaluationVersión en línea Computer System Security Chapter 11 por Aidora Abdullah 1 EAL 1 2 Security Target 3 TCSEC 4 Common Criteria 5 Trusted Execution Environment 6 Evaluation Assurance Level (EAL) 7 Purpose of Evaluation 8 Functionality 9 ITSEC 10 Assurance 11 Method of Evaluation 12 EAL 7 13 Target of Evaluation 14 Protection Profile 15 Cryptographic Modules, Security Levels Implementation-dependent statement of security needs for a specific identified TOE. Defines what has to be done in an evaluation. Functionally tested. A reusable set of security requirements. An international set of specifications and guidelines designed to evaluate information security products and systems. formally verified, designed and tested. European security evaluation criteria separating functionality and assurance. Security evaluation criteria for US Defense sector. Evaluation should not miss problems / different evaluations of the same product should give the same results. An example of Data Protection, Protection Profile. Software has to meet generic security requirements; OR system meets specific security requirements of a given application. Product/System has the security properties claimed, is suitable for a given application, and is accredited. System provides adequate for meeting a user's concrete security requirements. The security services have been implemented properly so that the user can rely on them. An example of a Trusted Computing Protection Profile.