8(495)909-90-01
8(964)644-46-00
pro@sio.su
Главная
Системы видеонаблюдения
Охранная сигнализация
Пожарная сигнализация
Система пожаротушения
Система контроля удаленного доступа
Оповещение и эвакуация
Контроль периметра
Система домофонии
Парковочные системы
Проектирование слаботочных сетей
Аварийный
контроль
Раздел: Документация

0 ... 100 101 102 103 104 105 106 ... 117

Protection of the TSF

FPR AMT Underlying abstract machine test -f

FPT FLS Fail secure

FPT ITA Availability of exported TSF data

FPT ITC Confidentiality of exported TSF data

FPT ITI Integrity of exported TSF data

FPT ITT Internal TOE TSF data transfer

FPT PHP TSF physical protection

FPT RCV Trusted recovery

1 - 2

1 - 2

Figure J.1 - Protection of the TSF class decomposition

1

1

1

1

3

1

2

3

1

2

3

4


Protection of the TSF 1

FPT RPL Replay detection and prevention - 1

FPT RVM Reference mediation

FPT SEP Domain separation

FPT SSP State synchrony protocol

FPT STM Time stamps

FPT TDC Inter-TSF TSF data consistency

FPT TRC Internal TOE TSF data replication consistency

FPT TST TSF self test

1- 2

1

2

3

L

Figure J.2 - Protection of the TSF class decomposition (Cont.)

1

1

1

1

1

From the point of view of this class, there are three significant portions that make up the TSF:

a)The TSFs abstract machine, which is the virtual or physical machine upon which the specific TSF implementation under evaluation executes.

b)The TSFs implementation, which executes on the abstract machine and implements the mechanisms that enforce the TSP.

c)The TSFs data, which are the administrative databases that guide the enforcement of the TSP.

All of the families in the FPT class can be related to these areas, and fall into the following groupings:

a) FPT PHP (TSF physical protection), which provides an authorised user with the ability to detect external attacks on the parts of the TOE that comprise the TSF.


b)FPTAMT (Underlying abstract machine test) and FPTTST (TSF self test), which provide an authorised user with the ability to verify the correct operation of the underlying abstract machine and the TSF as well as the integrity of the TSF data and executable code.

c)FPTSEP (Domain separation) and FPTRVM (Reference mediation), which protect the TSF during execution and ensure that the TSF cannot be bypassed. When appropriate components from these families are combined with the appropriate components from ADVINT (TSF internals), the TOE can be said to have what has been traditionally called a "Reference Monitor."

d)FPTRCV (Trusted recovery), FPTFLS (Fail secure), and FPTTRC (Internal TOE TSF data replication consistency), which address the behaviour of the TSF when failure occurs and immediately after.

e)FPTITA (Availability of exported TSF data), FPTITC (Confidentiality of exported TSF data), FPTITT (Integrity of exported TSF data), which address the protection and availability of TSF data between the TSF and a remote trusted IT product.

f)FPTITT (Internal TOE TSF data transfer), which addresses protection of TSF data when it is transmitted between physically-separated parts of the TOE.

g)FPTRPL (Replay detection), which addresses the replay of various types of information and/or operations.

h)FPTSSP (State synchrony protocol), which addresses the synchronisation of states, based upon TSF data, between different parts of a distributed TSF.

i)FPTSTM (Time stamps), which addresses reliable timing.

j) FPTTDC (Inter-TSF TSF data consistency), which addresses the consistency of TSF data shared between the TSF and a remote trusted IT product.



0 ... 100 101 102 103 104 105 106 ... 117