Relier Pairs Security EvaluationVersion en ligne Computer System Security Chapter 11 par Aidora Abdullah 1 Method of Evaluation 2 Target of Evaluation 3 Trusted Execution Environment 4 Evaluation Assurance Level (EAL) 5 EAL 7 6 Cryptographic Modules, Security Levels 7 Assurance 8 Security Target 9 TCSEC 10 Protection Profile 11 EAL 1 12 Functionality 13 Common Criteria 14 ITSEC 15 Purpose of Evaluation System provides adequate for meeting a user's concrete security requirements. Security evaluation criteria for US Defense sector. An example of Data Protection, Protection Profile. An example of a Trusted Computing Protection Profile. European security evaluation criteria separating functionality and assurance. formally verified, designed and tested. The security services have been implemented properly so that the user can rely on them. Functionally tested. Evaluation should not miss problems / different evaluations of the same product should give the same results. Software has to meet generic security requirements; OR system meets specific security requirements of a given application. Defines what has to be done in an evaluation. Implementation-dependent statement of security needs for a specific identified TOE. A reusable set of security requirements. An international set of specifications and guidelines designed to evaluate information security products and systems. Product/System has the security properties claimed, is suitable for a given application, and is accredited.