Relacionar Columnas Security EvaluationVersión en línea Computer System Security Chapter 11 por Aidora Abdullah 1 ITSEC 2 Security Target 3 Cryptographic Modules, Security Levels 4 EAL 1 5 Assurance 6 Evaluation Assurance Level (EAL) 7 TCSEC 8 Protection Profile 9 Target of Evaluation 10 Trusted Execution Environment 11 EAL 7 12 Purpose of Evaluation 13 Functionality 14 Method of Evaluation 15 Common Criteria Functionally tested. Software has to meet generic security requirements; OR system meets specific security requirements of a given application. Security evaluation criteria for US Defense sector. An example of a Trusted Computing Protection Profile. An example of Data Protection, Protection Profile. Defines what has to be done in an evaluation. Implementation-dependent statement of security needs for a specific identified TOE. System provides adequate for meeting a user's concrete security requirements. European security evaluation criteria separating functionality and assurance. formally verified, designed and tested. A reusable set of security requirements. Product/System has the security properties claimed, is suitable for a given application, and is accredited. An international set of specifications and guidelines designed to evaluate information security products and systems. The security services have been implemented properly so that the user can rely on them. Evaluation should not miss problems / different evaluations of the same product should give the same results.