Difference between revisions of "Common Criteria"

From MgmtWiki
Jump to: navigation, search
(Taxonomy)
(Taxonomy)
 
Line 5: Line 5:
 
* [https://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R5_marked_changes.pdf Common Criteria for Information Technology Security Evaluation]
 
* [https://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R5_marked_changes.pdf Common Criteria for Information Technology Security Evaluation]
 
===Taxonomy===
 
===Taxonomy===
The entire document is filled with jargon of their own making. [https://www.cs.clemson.edu/course/cpsc420/material/Evaluation/CC.pdf This document contains the most interesting terms.] Some have been abstraction below.
+
The entire document is filled with jargon of their own making. [https://www.cs.clemson.edu/course/cpsc420/material/Evaluation/CC.pdf This linked document contains the most interesting terms.] Some have been abstraction below.
 
* TOE = target of evaluation  set of software, firmware and/or hardware possibly accompanied by guidance
 
* TOE = target of evaluation  set of software, firmware and/or hardware possibly accompanied by guidance
 
* TSF = TOE Security Function. The TSF is a generalization of the TCSEC concept of a TCB. (Trusted Computing Base.)
 
* TSF = TOE Security Function. The TSF is a generalization of the TCSEC concept of a TCB. (Trusted Computing Base.)

Latest revision as of 16:35, 21 September 2022

Full Title or Meme

Common Criteria International Standards of secure computing and communications.

Context

Taxonomy

The entire document is filled with jargon of their own making. This linked document contains the most interesting terms. Some have been abstraction below.

  • TOE = target of evaluation  set of software, firmware and/or hardware possibly accompanied by guidance
  • TSF = TOE Security Function. The TSF is a generalization of the TCSEC concept of a TCB. (Trusted Computing Base.)

References