Relacionar Columnas Security EvaluationVersión en línea Computer System Security Chapter 11 por Aidora Abdullah 1 Protection Profile 2 Assurance 3 Security Target 4 Functionality 5 Purpose of Evaluation 6 Common Criteria 7 TCSEC 8 Cryptographic Modules, Security Levels 9 Method of Evaluation 10 Target of Evaluation 11 EAL 1 12 EAL 7 13 Evaluation Assurance Level (EAL) 14 Trusted Execution Environment 15 ITSEC An example of Data Protection, Protection Profile. Software has to meet generic security requirements; OR system meets specific security requirements of a given application. Evaluation should not miss problems / different evaluations of the same product should give the same results. Implementation-dependent statement of security needs for a specific identified TOE. Product/System has the security properties claimed, is suitable for a given application, and is accredited. A reusable set of security requirements. European security evaluation criteria separating functionality and assurance. Security evaluation criteria for US Defense sector. The security services have been implemented properly so that the user can rely on them. System provides adequate for meeting a user's concrete security requirements. formally verified, designed and tested. An example of a Trusted Computing Protection Profile. An international set of specifications and guidelines designed to evaluate information security products and systems. Functionally tested. Defines what has to be done in an evaluation.