3 - Common Criteria Flashcards

1
Q

How many Evaluation Assurance Levels (EALs) are there?

A

7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What EAL typically would a commercial operating systems achieve?

A

EAL4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What EAL typically would a smart card receive?

A

EAL5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is EAL1?

A

Functionally Tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is EAL2?

A

Structurally Tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is EAL3?

A

Methodically Tested and Checked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is EAL4?

A

Methodically Designed, tested and reviewed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is EAL5?

A

Semi-formally designed and tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is EAL6?

A

Semi-formally verified, designed and tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is EAL7?

A

Formally verified designed and tested

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the security target (ST)?

A

Implementation-dependent statement of security needs for a specific identified TOE or The security target specifies what the vendor claims it can do and what options may be available Threat the product will mitigate and the security functional requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the protection profile (PP)?

A

The protection profile specify the areas that a product will be evaluated against (what do you want it to do?) E.g Network device, operating systems are example of protection profiles which list attributes to test the target of evaluation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the ISO for Evaluation Criteria for Information Technology Security

A

ISO 15408

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Target of Evaluation (TOE)

A

the product or system that is the subject of the evaluation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do EAL 5-7 involve?

A

Formal mathematical verification of the design against how the system actually works.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security assurance requirements (SARs)

A

The SARs are a description of how the TOE is to be evaluated. SARs are statements of the non functional requirements the TOE should have to have assurance. E.g Change mangement process how the source code is review/handled.

SAR is defined in part 3

17
Q

Which ISO I required for common criteria testing laboratories?

A

ISO/IEC 17025

18
Q

What are Security Objectives

A

intended solution to the problem specified by the security problem definition - How the TOE mitigates the threats defined by the Security Problem Definition

19
Q

What is the Security Problem Definition?

A

describes the threats and assumptions about the operational environment.

20
Q

What are SFR

A

How the TOE meets Security objectives. List of testable features. Detailed specification

21
Q

What is TSF?

A

Trusted Security function - The part of the TOE being tested.

22
Q

what is CEM

A

Common Methodology for Information Technology Security Evaluation (CEM)

23
Q

Who is CEM for?

A

primarily evaluators applying the CC and certifiers confirming evaluator actions