Matching Pairs Security EvaluationOnline version Computer System Security Chapter 11 by Aidora Abdullah 1 TCSEC 2 Protection Profile 3 Purpose of Evaluation 4 Method of Evaluation 5 Trusted Execution Environment 6 Security Target 7 Evaluation Assurance Level (EAL) 8 Functionality 9 Common Criteria 10 EAL 1 11 Assurance 12 Target of Evaluation 13 EAL 7 14 ITSEC 15 Cryptographic Modules, Security Levels European security evaluation criteria separating functionality and assurance. An example of a Trusted Computing Protection Profile. Implementation-dependent statement of security needs for a specific identified TOE. The security services have been implemented properly so that the user can rely on them. An example of Data Protection, Protection Profile. Security evaluation criteria for US Defense sector. Functionally tested. Product/System has the security properties claimed, is suitable for a given application, and is accredited. An international set of specifications and guidelines designed to evaluate information security products and systems. System provides adequate for meeting a user's concrete security requirements. Software has to meet generic security requirements; OR system meets specific security requirements of a given application. formally verified, designed and tested. Defines what has to be done in an evaluation. A reusable set of security requirements. Evaluation should not miss problems / different evaluations of the same product should give the same results.