Matching Pairs Security EvaluationOnline version Computer System Security Chapter 11 by Aidora Abdullah 1 Purpose of Evaluation 2 Cryptographic Modules, Security Levels 3 Common Criteria 4 Trusted Execution Environment 5 Target of Evaluation 6 Assurance 7 Method of Evaluation 8 TCSEC 9 Security Target 10 Evaluation Assurance Level (EAL) 11 Functionality 12 ITSEC 13 EAL 7 14 Protection Profile 15 EAL 1 An example of a Trusted Computing Protection Profile. Functionally tested. Security evaluation criteria for US Defense sector. Implementation-dependent statement of security needs for a specific identified TOE. The security services have been implemented properly so that the user can rely on them. European security evaluation criteria separating functionality and assurance. A reusable set of security requirements. Product/System has the security properties claimed, is suitable for a given application, and is accredited. An example of Data Protection, Protection Profile. Software has to meet generic security requirements; OR system meets specific security requirements of a given application. System provides adequate for meeting a user's concrete security requirements. Defines what has to be done in an evaluation. Evaluation should not miss problems / different evaluations of the same product should give the same results. An international set of specifications and guidelines designed to evaluate information security products and systems. formally verified, designed and tested.