Global Information Lookup Global Information

Security Target information


Common Criteria for Information Technology Security Evaluation, version 3.1 Part 1 (called CC 3.1 or CC)[1] defines the Security Target (ST) as an "implementation-dependent statement of security needs for a specific identified Target of Evaluation (TOE)". In other words, the ST defines boundary and specifies the details of the TOE. In a product evaluation process according to the CC the ST document is provided by the vendor of the product.

An ST defines information assurance security and functional requirements for the given information system product, which is called the Target of Evaluation (TOE). An ST is a complete and rigorous description of a security problem in terms of TOE description, threats, assumptions, security objectives, security functional requirements (SFRs), security assurance requirements (SARs), and rationales. The SARs are typically given as a number 1 through 7 called Evaluation Assurance Level (EAL), indicating the depth and rigor of the security evaluation, usually in the form of supporting documentation and testing, that the product meets the SFRs.[citation needed]

An ST contains some (but not very detailed) implementation-specific information that demonstrates how the product addresses the security requirements. It may refer to one or more Protection Profiles (PPs). In such a case, the ST must fulfill the generic security requirements given in each of these PPs, and may define further requirements.

  1. ^ Common Criteria Portal – http://www.commoncriteriaportal.org/cc/

and 24 Related for: Security Target information

Request time (Page generated in 1.2116 seconds.)

Security Target

Last Update:

Security Evaluation, version 3.1 Part 1 (called CC 3.1 or CC) defines the Security Target (ST) as an "implementation-dependent statement of security needs...

Word Count : 663

History of Target Corporation

Last Update:

The history of Target Corporation first began in 1902 by George Dayton. The company was originally named Goodfellow Dry Goods in June 1902 before being...

Word Count : 7793

Common Criteria

Last Update:

system users can specify their security functional and assurance requirements (SFRs and SARs, respectively) in a Security Target (ST), and may be taken from...

Word Count : 3714

Target hardening

Last Update:

Target hardening, also referred to simply as hardening when made clear by the context, is a term used by police officers, those working in security, and...

Word Count : 455

Target Corporation

Last Update:

Target Corporation is an American retail corporation that operates a chain of discount department stores and hypermarkets, headquartered in Minneapolis...

Word Count : 15077

Security level

Last Update:

128-bit security level, which is considered roughly equivalent to a RSA using 3072-bit key. In this context, security claim or target security level is...

Word Count : 1360

Evaluation Assurance Level

Last Update:

Security Targets. A product's fitness for a particular security application depends on how well the features listed in the product's Security Target fulfill...

Word Count : 1801

Soft target

Last Update:

(2006). Open Target: Where America Is Vulnerable to Attack. St Martin's. Forest, James J.F. (2006). Homeland Security: Protecting America's Targets. Greenwood...

Word Count : 514

ITSEC

Last Update:

implements the target of evaluation concept and the Security Target document. The product or system being evaluated, called the target of evaluation,...

Word Count : 414

Computer security

Last Update:

Computer security, cybersecurity, digital security, or information technology security (IT security) is the protection of computer systems and networks...

Word Count : 22101

Hard target

Last Update:

Hard target can refer to: Hard Target, a 1993 American action film. A defended target (in relation to a security threat); the opposite of a soft target This...

Word Count : 59

STRIDE model

Last Update:

identifying computer security threats developed by Praerit Garg and Loren Kohnfelder at Microsoft. It provides a mnemonic for security threats in six categories...

Word Count : 378

Multilevel security

Last Update:

have also been certified at EAL4 to the labeled security protection profile (LSPP). The security target includes both desktop and network functionality...

Word Count : 4178

Operations security

Last Update:

March 20, 2008. Espionage Target You - DoD Film on Operational Security on YouTube U.S. Government OPSEC site Operation Security Professional's Organization...

Word Count : 375

Targeted killing

Last Update:

Journal of Strategic Security focusing on the future of drones in geopolitics finds the U.S. government's use of drones in targeted killing operations an...

Word Count : 14499

Penetration test

Last Update:

attack on a system, systems, applications or another target in the environment, searching for security weaknesses. After testing, they will typically document...

Word Count : 3329

Target Canada

Last Update:

Target Canada Co. was the Canadian subsidiary of the Target Corporation, the eighth-largest retailer in the United States. Formerly headquartered in Mississauga...

Word Count : 7194

Protection Profile

Last Update:

ISO/IEC 15408 and the Common Criteria (CC). As the generic form of a Security Target (ST), it is typically created by a user or user community and provides...

Word Count : 606

Automatic target recognition

Last Update:

ATR for border security, safety systems to identify objects or people on a subway track, automated vehicles, and many others. Target recognition has...

Word Count : 1363

United States Department of Homeland Security

Last Update:

States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior...

Word Count : 7197

1998 bombing of Iraq

Last Update:

the cruise missile and bombing attacks was to strike military and security targets in Iraq that contributed to its ability to produce, store, maintain...

Word Count : 2204

Home security

Last Update:

into a home within 60 seconds. Most target cash first followed by jewels, drugs, and electronics. Common security methods include never hiding extra keys...

Word Count : 1467

Target ship

Last Update:

A target ship is a vessel — typically an obsolete or captured warship — used as a seaborne target for naval gunnery practice or for weapons testing. Targets...

Word Count : 1210

Target fixation

Last Update:

Target fixation is an attentional phenomenon observed in humans in which an individual becomes so focused on an observed object (be it a target or hazard)...

Word Count : 388

PDF Search Engine © AllGlobal.net