8(495)909-90-01
8(964)644-46-00
pro@sio.su
Главная
Системы видеонаблюдения
Охранная сигнализация
Пожарная сигнализация
Система пожаротушения
Система контроля удаленного доступа
Оповещение и эвакуация
Контроль периметра
Система домофонии
Парковочные системы
Проектирование слаботочных сетей
Аварийный
контроль
Раздел: Документация

0 1 2 3 4 ... 20

4.5.3TOE evaluation ............................

4.6Assurance maintenance.........................

5Common Criteria requirements and evaluation results

5.1Introduction..................................

5.2Requirements in PPs and STs ....................

5.2.1PP evaluation results ........................

5.3Requirements in TOE ..........................

5.3.1TOE evaluation results ......................

5.4Caveats on evaluation results ....................

5.5Use of TOE evaluation results ...................

Annex A The Common Criteria project (informative)........,

A.1Background to the Common Criteria project ........

A.2Development of the Common Criteria .............

A.3Common Criteria project sponsoring organisations . . .

Annex B Specification of Protection Profiles .................

B.1Overview ....................................

B.2Content of Protection Profile ....................

B.2.1Content and presentation ....................

B.2.2PP introduction ............................

B.2.3TOE description ...........................

B.2.4TOE security environment ...................

B.2.5Security objectives .........................

B.2.6IT security requirements .....................

B.2.7Application notes ..........................

B.2.8Rationale .................................

28 28

29

29 30 30 30

31 31 32

33

33 33 34

37

37 37 37 37 38 38 39 40 41 41

Annex C Specification of Security Targets..................................43

C.1Overview ...................................................43

C.2Content of Security Target .....................................43

C.2.1Content and presentation ...................................43

C.2.2ST introduction ...........................................43

C .2.3TOE description ..........................................45

C.2.4TOE security environment ..................................45

C.2.5Security objectives ........................................46

C.2.6IT securityrequirements ....................................46

C.2.7TOE summary specification .................................47

C.2.8PP claims................................................48

C.2.9Rationale ................................................49

Annex D

Bibliography (informative)

53


list of figures

Figure 3.1- Evaluation context ..............................................11

Figure 4.1- Security concepts and relationships .................................13

Figure 4.2- Evaluation concepts and relationships ...............................14

Figure 4.3- TOE development model .........................................16

Figure 4.4- TOEevaluation process ..........................................17

Figure 4.5- Derivation of requirements and specifications .........................20

Figure 4.6- Organisation and construction ofrequirements ........................24

Figure 4.7- Use ofsecurity requirements ......................................26

Figure 5.1- Evaluation results ...............................................29

Figure 5.2- Use ofTOE evaluation results .....................................32

Figure B.1- Protection Profile content .........................................38

Figure C.1- Security Target content ...........................................44


list of tables

Table 3.1 - Roadmap to the Common Criteria .................................. 12



0 1 2 3 4 ... 20