Matching Pairs Security EvaluationOnline version Computer System Security Chapter 11 by Aidora Abdullah 1 Protection Profile 2 Assurance 3 EAL 7 4 Common Criteria 5 Trusted Execution Environment 6 EAL 1 7 Functionality 8 Security Target 9 Cryptographic Modules, Security Levels 10 Target of Evaluation 11 Purpose of Evaluation 12 ITSEC 13 Evaluation Assurance Level (EAL) 14 TCSEC 15 Method of Evaluation The security services have been implemented properly so that the user can rely on them. Product/System has the security properties claimed, is suitable for a given application, and is accredited. An example of a Trusted Computing Protection Profile. Software has to meet generic security requirements; OR system meets specific security requirements of a given application. Implementation-dependent statement of security needs for a specific identified TOE. An example of Data Protection, Protection Profile. Security evaluation criteria for US Defense sector. Defines what has to be done in an evaluation. European security evaluation criteria separating functionality and assurance. Functionally tested. A reusable set of security requirements. Evaluation should not miss problems / different evaluations of the same product should give the same results. formally verified, designed and tested. System provides adequate for meeting a user's concrete security requirements. An international set of specifications and guidelines designed to evaluate information security products and systems.