Evaluation Criteria Flashcards

1
Q

Orange Book

A

DoD Trusted Computer System Evaluation Criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Green Book

A

DoD Password Management Guidelines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Yellow Book

A

Guidance for Applying TCSEC in Specific Environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Tan Book

A

A Guide to Understanding Audit in Trusted Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bright Blue Book

A

Trusted Product Evaluation: A Guide for Vendors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Light Blue Book

A

PC Security Considerations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Neon Orange Book

A

A Guide to Understanding Discretionary Access Controls in Trusted Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Aqua Book

A

Glossary of Computer Security Terms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Red Book

A

Trusted Network Interpretation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Amber Book

A

A Guide to Understanding Configuration Management in Trusted Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Burgundy Book

A

A Guide to Understanding Design Documentation in Trusted Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Lavender Book

A

A Guide to Understanding Trusted Distribution in Trusted Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Venice Blue Book

A

Computer Security Subsystem Interpretation of the TCSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

C1

A

Discretionary Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

C2

A

Controlled Access Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

B1

A

Labeled Security

17
Q

B2

A

Structured Protection

18
Q

B3

A

Security Domains

19
Q

A1

A

Verified Protection

20
Q

Category A

A

Verified protection. The highest level of security.

21
Q

Category B

A

Mandatory protection.

22
Q

Category C

A

Discretionary protection.

23
Q

Category D

A

Minimal protection. Reserved for systems that have been evaluated but do not meet requirements to belong to any other category.

24
Q

EAL1

A

Functionally tested. Applies when some confidence in correct operation is required but where threats to security are not serious. This is of value when independent assurance that due care has been exercised in protecting personal information is necessary.

25
Q

EAL2

A

Structurally tested. Applies when delivery of design information and test results are in keeping with good commercial practices. This is of value when developers or users require low to moderate levels of independently assured security. IT is especially relevant when evaluating legacy systems.

26
Q

EAL3

A

Methodically tested and checked. Applies when security engineering begins at the design stage and is carried through without substantial subsequent alteration. This is of value when developers or users require a moderate level of independently assured security, including thorough investigation of TOE and its development.

27
Q

EAL4

A

Methodically designed, tested, and reviewed. Applies when rigorous, positive security engineering and good commercial development practices are used. This does not require substantial specialist knowledge, skills, or resources. It involves independent testing of all TOE security functions.

28
Q

EAL5

A

Semi-formally designed and tested. Uses rigorous security engineering and commercial development practices, including specialist security engineering techniques, for semi-formal testing. This applies when developers or users require a high level of independently assured security in a planned development approach, followed by rigorous development.

29
Q

EAL6

A

Semi-formally verified, designed, and tested. Uses direct, rigorous security engineering techniques at all phases of design, development, and testing to produce a premium TOE. This applies when TOEs for high-risk situations are needed, where the value of protected assets justifies additional cost. Extensive testing reduces risks of penetration, probability of cover channels, and vulnerability to attack.

30
Q

EAL7

A

Formally verified, designed, and tested. Used only for highest-risk situations or where high-value assets are involved. This is limited to TOEs where tightly focused security functionality is subject to extensive formal analysis and testing.