CC Flashcards

1
Q

package

A

named set of either security functional or security assurance requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Protection Profile (PP)

A

implementation-independent statement of security needs for a TOE type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security Target (ST)

A

implementation-dependent statement of security needs for a specific identified TOE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ST

A

ST always describes a specific TOE (e.g. Palo Alto Firewall)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

PP

A

intended to describe a TOE type (e.g. Firewalls).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ST

A

Describes requirements for a TOE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PP

A

Describes the general requirements for a TOE type.

Protection Profile is not written for a specific product

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PP

A

Written by User Community, Developer of a TOE, Government or Large Corporation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ST

A

Written by the developer of that TOE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PP/ST

A

PP determines the allowed type of conformance of the ST to the PP.

  1. if the PP states that strict conformance is required, the ST shall conform to the PP in a strict manner;
  2. if the PP states that demonstrable conformance is required, the ST shall conform to the PP in a strict or demonstrable manner.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

EAL1

Functionally Tested

A
  1. LOW confidence (LOW).
  2. Provides assurance through unique identification of the TOE.
  3. Provides a meaningful increase in assurance over unevaluated IT
  4. Requires limited security target (ST)
  5. Threats to security are not viewed as serious.
  6. Due care has been exercised with respect to the protection of personal Information.
  7. Could be successfully conducted without assistance from the developer.
  8. Analysis is supported by a search for potential vulnerabilities in the public domain and independent testing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

EAL2

Structurally Tested

A

LOW to MODERATE level of independently assured security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

EAL3

methodically tested and checked

A

MODERATE level of independently assured security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

EAL4

methodically designed, tested, and reviewed

A

MODERATE to HIGH level of independently assured security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

EAL4

A

HIGHEST LEVEL at which it is likely to be economically feasible to retrofit to an existing product line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

EAL5

semiformally designed and tested

A

HIGH level of independently assured security

17
Q

EAL6

semiformally verified design and tested

A

high risk situations.

high attack potential

18
Q

EAL7

semiformally verified design and tested

A

extremely high risk situations and/or where the high value of the assets justifies the higher costs