Matching Pairs Security EvaluationOnline version Computer System Security Chapter 11 by Aidora Abdullah 1 Method of Evaluation 2 Purpose of Evaluation 3 TCSEC 4 Protection Profile 5 Target of Evaluation 6 EAL 1 7 Assurance 8 EAL 7 9 Security Target 10 Functionality 11 Cryptographic Modules, Security Levels 12 Evaluation Assurance Level (EAL) 13 Common Criteria 14 ITSEC 15 Trusted Execution Environment Security evaluation criteria for US Defense sector. An example of a Trusted Computing Protection Profile. Software has to meet generic security requirements; OR system meets specific security requirements of a given application. The security services have been implemented properly so that the user can rely on them. Implementation-dependent statement of security needs for a specific identified TOE. Product/System has the security properties claimed, is suitable for a given application, and is accredited. Evaluation should not miss problems / different evaluations of the same product should give the same results. Defines what has to be done in an evaluation. Functionally tested. System provides adequate for meeting a user's concrete security requirements. An example of Data Protection, Protection Profile. An international set of specifications and guidelines designed to evaluate information security products and systems. formally verified, designed and tested. European security evaluation criteria separating functionality and assurance. A reusable set of security requirements.