Relacionar Columnas Security EvaluationVersión en línea Computer System Security Chapter 11 por Aidora Abdullah 1 Common Criteria 2 Purpose of Evaluation 3 Protection Profile 4 Security Target 5 ITSEC 6 EAL 7 7 Method of Evaluation 8 Target of Evaluation 9 Trusted Execution Environment 10 Assurance 11 TCSEC 12 Evaluation Assurance Level (EAL) 13 EAL 1 14 Functionality 15 Cryptographic Modules, Security Levels Evaluation should not miss problems / different evaluations of the same product should give the same results. An example of a Trusted Computing Protection Profile. System provides adequate for meeting a user's concrete security requirements. Functionally tested. A reusable set of security requirements. The security services have been implemented properly so that the user can rely on them. Defines what has to be done in an evaluation. An international set of specifications and guidelines designed to evaluate information security products and systems. Product/System has the security properties claimed, is suitable for a given application, and is accredited. Implementation-dependent statement of security needs for a specific identified TOE. formally verified, designed and tested. European security evaluation criteria separating functionality and assurance. Software has to meet generic security requirements; OR system meets specific security requirements of a given application. An example of Data Protection, Protection Profile. Security evaluation criteria for US Defense sector.