Matching Pairs Security EvaluationOnline version Computer System Security Chapter 11 by Aidora Abdullah 1 Common Criteria 2 Protection Profile 3 Target of Evaluation 4 Purpose of Evaluation 5 Trusted Execution Environment 6 EAL 1 7 Functionality 8 Security Target 9 ITSEC 10 Method of Evaluation 11 Evaluation Assurance Level (EAL) 12 Cryptographic Modules, Security Levels 13 Assurance 14 EAL 7 15 TCSEC formally verified, designed and tested. System provides adequate for meeting a user's concrete security requirements. The security services have been implemented properly so that the user can rely on them. Evaluation should not miss problems / different evaluations of the same product should give the same results. Security evaluation criteria for US Defense sector. Functionally tested. Implementation-dependent statement of security needs for a specific identified TOE. Defines what has to be done in an evaluation. A reusable set of security requirements. An international set of specifications and guidelines designed to evaluate information security products and systems. European security evaluation criteria separating functionality and assurance. Product/System has the security properties claimed, is suitable for a given application, and is accredited. Software has to meet generic security requirements; OR system meets specific security requirements of a given application. An example of Data Protection, Protection Profile. An example of a Trusted Computing Protection Profile.