Download Information technology - Security techniques - Evaluation PDF

Read or Download Information technology - Security techniques - Evaluation criteria for IT security iso15408-1 PDF

Similar security books

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws

The hugely winning safeguard ebook returns with a brand new version, thoroughly updatedWeb purposes are front door to so much companies, exposing them to assaults that could reveal own info, execute fraudulent transactions, or compromise usual clients. This sensible ebook has been thoroughly up to date and revised to debate the most recent step by step strategies for attacking and protecting the variety of ever-evolving net purposes.

Digital Archaeology: The Art and Science of Digital Forensics

The swift proliferation of cyber crime is expanding the call for for electronic forensics specialists in either legislation enforcement and within the inner most area. In electronic Archaeology, professional practitioner Michael Graves has written the main thorough, reasonable, and up to date consultant to the foundations and strategies of recent electronic forensics.

Innovations in Defence Support Systems – 3: Intelligent Paradigms in Security

This publication is a continuation of our earlier volumes on concepts in Defence help platforms. This publication encompasses a pattern of modern advances in clever tracking. The contributions include:· information fusion in smooth surveillance· disbursed clever surveillance platforms modeling for functionality evaluate· Incremental studying on trajectory clustering· Pedestrian velocity profiles from video series· System-wide monitoring of people· A scalable process in response to normality parts for clever surveillance· disbursed digital camera overlap estimation· Multi-robot crew for environmental monitoringThe booklet is directed to the protection specialists, engineers, scientists, scholars and professors who're attracted to clever tracking.

Advances in Sensing with Security Applications

The chapters during this quantity have been offered on the July 2005NATO complex research Institute on Advances in Sensing with safeguard App- cations. The convention was once held on the attractive Il Ciocco hotel close to Lucca, within the excellent Tuscany zone of northern Italy. once more we accumulated at this idyllic spot to discover and expand the reciprocity among arithmetic and engineering.

Additional info for Information technology - Security techniques - Evaluation criteria for IT security iso15408-1

Sample text

4 TOE security environment The statement of TOE security environment shall describe the security aspects of the environment in which the TOE is intended to be used and the manner in which it is expected to be employed. This statement shall include the following: 38 © ISO/IEC a) ISO/IEC 15408-1:1999(E) A description of assumptions shall describe the security aspects of the environment in which the TOE will be used or is intended to be used. This shall include the following: information about the intended usage of the TOE, including such aspects as the intended application, potential asset value, and possible limitations of use; and information about the environment of use of the TOE, including physical, personnel, and connectivity aspects.

In some circumstances, where the additions are substantial, it may be preferable to restate the PP contents within the ST as an aid to clarity. e) The case where an ST claims to be partially conformant to a PP is not admissible for CC evaluation. The CC is not prescriptive with respect to the choice of restating or referencing PP objectives and requirements. The fundamental requirement is that the ST content be complete, clear, and unambiguous such that evaluation of the ST is possible, the ST is an acceptable basis for the TOE evaluation, and the traceability to any claimed PP is clear.

G. g. a password or hash function). All such functions shall meet this minimum level. The level shall be one of the following: SOF-basic, SOF-medium, SOF-high. The selection of the 46 © ISO/IEC ISO/IEC 15408-1:1999(E) level shall be consistent with the identified security objectives for the TOE. Optionally, specific strength of function metrics may be defined for selected functional requirements, in order to meet certain security objectives for the TOE. 1), it will be assessed whether the strength claims made for individual TOE security functions and the overall minimum strength level are met by the TOE.

Download PDF sample

Rated 4.33 of 5 – based on 47 votes