Relier Pairs Security EvaluationVersion en ligne Computer System Security Chapter 11 par Aidora Abdullah 1 Evaluation Assurance Level (EAL) 2 EAL 7 3 Trusted Execution Environment 4 ITSEC 5 TCSEC 6 Assurance 7 Purpose of Evaluation 8 EAL 1 9 Functionality 10 Protection Profile 11 Target of Evaluation 12 Method of Evaluation 13 Cryptographic Modules, Security Levels 14 Security Target 15 Common Criteria A reusable set of security requirements. Defines what has to be done in an evaluation. Functionally tested. An example of a Trusted Computing Protection Profile. Software has to meet generic security requirements; OR system meets specific security requirements of a given application. European security evaluation criteria separating functionality and assurance. An example of Data Protection, Protection Profile. Product/System has the security properties claimed, is suitable for a given application, and is accredited. Implementation-dependent statement of security needs for a specific identified TOE. Security evaluation criteria for US Defense sector. The security services have been implemented properly so that the user can rely on them. System provides adequate for meeting a user's concrete security requirements. formally verified, designed and tested. Evaluation should not miss problems / different evaluations of the same product should give the same results. An international set of specifications and guidelines designed to evaluate information security products and systems.