Relier Pairs Security EvaluationVersion en ligne Computer System Security Chapter 11 par Aidora Abdullah 1 EAL 1 2 Security Target 3 Method of Evaluation 4 EAL 7 5 Cryptographic Modules, Security Levels 6 Assurance 7 Trusted Execution Environment 8 Protection Profile 9 Purpose of Evaluation 10 ITSEC 11 Common Criteria 12 Evaluation Assurance Level (EAL) 13 Functionality 14 TCSEC 15 Target of Evaluation Security evaluation criteria for US Defense sector. Implementation-dependent statement of security needs for a specific identified TOE. System provides adequate for meeting a user's concrete security requirements. The security services have been implemented properly so that the user can rely on them. European security evaluation criteria separating functionality and assurance. formally verified, designed and tested. Product/System has the security properties claimed, is suitable for a given application, and is accredited. Defines what has to be done in an evaluation. An international set of specifications and guidelines designed to evaluate information security products and systems. Software has to meet generic security requirements; OR system meets specific security requirements of a given application. Functionally tested. A reusable set of security requirements. An example of Data Protection, Protection Profile. Evaluation should not miss problems / different evaluations of the same product should give the same results. An example of a Trusted Computing Protection Profile.