Matching Pairs Security EvaluationOnline version Computer System Security Chapter 11 by Aidora Abdullah 1 Trusted Execution Environment 2 EAL 7 3 Security Target 4 ITSEC 5 Assurance 6 Evaluation Assurance Level (EAL) 7 EAL 1 8 Cryptographic Modules, Security Levels 9 TCSEC 10 Method of Evaluation 11 Purpose of Evaluation 12 Functionality 13 Target of Evaluation 14 Common Criteria 15 Protection Profile An international set of specifications and guidelines designed to evaluate information security products and systems. Implementation-dependent statement of security needs for a specific identified TOE. Security evaluation criteria for US Defense sector. System provides adequate for meeting a user's concrete security requirements. A reusable set of security requirements. An example of Data Protection, Protection Profile. Evaluation should not miss problems / different evaluations of the same product should give the same results. An example of a Trusted Computing Protection Profile. Defines what has to be done in an evaluation. formally verified, designed and tested. European security evaluation criteria separating functionality and assurance. Software has to meet generic security requirements; OR system meets specific security requirements of a given application. Product/System has the security properties claimed, is suitable for a given application, and is accredited. The security services have been implemented properly so that the user can rely on them. Functionally tested.