Evaluation Flashcards

1
Q

What is the purpose of evaluation in system security?

A

Evaluation is a process where the evidence for assurance is gathered and analyzed. This process gives us a measure of trust, i.e., the extent to which the system satisfies the defined security criteria.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does a formal evaluation methodology provide?

A

A formal evaluation methodology provides:

  • A set of requirements defining the security functionality for the system.
  • A set of assurance requirements that specify the steps for analyzing the assurance evidence.
  • A methodology for determining whether the system meets the security requirements based on the analysis of the assurance evidence.
  • A measure of the evaluation result, level of trust, which indicates how trustworthy the system is with respect to the requirements.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are typically the targets of an evaluation (what is being evaluated)?

A

The target can either be:

  • A product, i.e., software, hardware, firmware.
  • A system which is a collection of products.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the two situations evaluation methods should try to prevent? What requirements are enforced to stop this?

A

Firstly, an evaluated system should not be determined to to contain serious flaw after an evaluation.

Secondly, different evaluations of the same system/product should not disagree in their assessment.

To prevent this from happening, the following requirements are enforced on evaluation methods:

  • Repeatability: re-evaluation by the same team gives the same results.
  • Reproducability: re-evaluation by a different team gives the same results.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some of the most famous evaluation methodologies?

A
  1. The Orange Book, better known as TCSEC.
  2. The German, French, and the British criteria.
  3. Information Technology Security Evaluation Criteria, also known as ITSEC.
  4. The Canadian criteria and the Federal criteria.
  5. The Common Criteria, also known as CC.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly