Relacionar Columnas Security EvaluationVersión en línea Computer System Security Chapter 11 por Aidora Abdullah 1 EAL 7 2 Common Criteria 3 EAL 1 4 Security Target 5 Cryptographic Modules, Security Levels 6 Purpose of Evaluation 7 Functionality 8 Assurance 9 Protection Profile 10 Target of Evaluation 11 TCSEC 12 Evaluation Assurance Level (EAL) 13 Method of Evaluation 14 Trusted Execution Environment 15 ITSEC Security evaluation criteria for US Defense sector. An international set of specifications and guidelines designed to evaluate information security products and systems. Implementation-dependent statement of security needs for a specific identified TOE. European security evaluation criteria separating functionality and assurance. System provides adequate for meeting a user's concrete security requirements. An example of a Trusted Computing Protection Profile. A reusable set of security requirements. Software has to meet generic security requirements; OR system meets specific security requirements of a given application. Evaluation should not miss problems / different evaluations of the same product should give the same results. An example of Data Protection, Protection Profile. Defines what has to be done in an evaluation. formally verified, designed and tested. Product/System has the security properties claimed, is suitable for a given application, and is accredited. The security services have been implemented properly so that the user can rely on them. Functionally tested.