Part of Common Criteria computer security standard
Common Criteria for Information Technology Security Evaluation, version 3.1 Part 1 (called CC 3.1 or CC)[1] defines the Security Target (ST) as an "implementation-dependent statement of security needs for a specific identified Target of Evaluation (TOE)". In other words, the ST defines boundary and specifies the details of the TOE. In a product evaluation process according to the CC the ST document is provided by the vendor of the product.
An ST defines information assurance security and functional requirements for the given information system product, which is called the Target of Evaluation (TOE).
An ST is a complete and rigorous description of a security problem in terms of TOE description, threats, assumptions, security objectives, security functional requirements (SFRs), security assurance requirements (SARs), and rationales. The SARs are typically given as a number 1 through 7 called Evaluation Assurance Level (EAL), indicating the depth and rigor of the security evaluation, usually in the form of supporting documentation and testing, that the product meets the SFRs.[citation needed]
An ST contains some (but not very detailed) implementation-specific information that demonstrates how the product addresses the security requirements.
It may refer to one or more Protection Profiles (PPs). In such a case, the ST must fulfill the generic security requirements given in each of these PPs, and may define further requirements.
Security Evaluation, version 3.1 Part 1 (called CC 3.1 or CC) defines the SecurityTarget (ST) as an "implementation-dependent statement of security needs...
The history of Target Corporation first began in 1902 by George Dayton. The company was originally named Goodfellow Dry Goods in June 1902 before being...
system users can specify their security functional and assurance requirements (SFRs and SARs, respectively) in a SecurityTarget (ST), and may be taken from...
Target hardening, also referred to simply as hardening when made clear by the context, is a term used by police officers, those working in security, and...
Target Corporation is an American retail corporation that operates a chain of discount department stores and hypermarkets, headquartered in Minneapolis...
128-bit security level, which is considered roughly equivalent to a RSA using 3072-bit key. In this context, security claim or targetsecurity level is...
SecurityTargets. A product's fitness for a particular security application depends on how well the features listed in the product's SecurityTarget fulfill...
(2006). Open Target: Where America Is Vulnerable to Attack. St Martin's. Forest, James J.F. (2006). Homeland Security: Protecting America's Targets. Greenwood...
implements the target of evaluation concept and the SecurityTarget document. The product or system being evaluated, called the target of evaluation,...
Computer security, cybersecurity, digital security, or information technology security (IT security) is the protection of computer systems and networks...
Hard target can refer to: Hard Target, a 1993 American action film. A defended target (in relation to a security threat); the opposite of a soft target This...
identifying computer security threats developed by Praerit Garg and Loren Kohnfelder at Microsoft. It provides a mnemonic for security threats in six categories...
have also been certified at EAL4 to the labeled security protection profile (LSPP). The securitytarget includes both desktop and network functionality...
March 20, 2008. Espionage Target You - DoD Film on Operational Security on YouTube U.S. Government OPSEC site Operation Security Professional's Organization...
Journal of Strategic Security focusing on the future of drones in geopolitics finds the U.S. government's use of drones in targeted killing operations an...
attack on a system, systems, applications or another target in the environment, searching for security weaknesses. After testing, they will typically document...
Target Canada Co. was the Canadian subsidiary of the Target Corporation, the eighth-largest retailer in the United States. Formerly headquartered in Mississauga...
ISO/IEC 15408 and the Common Criteria (CC). As the generic form of a SecurityTarget (ST), it is typically created by a user or user community and provides...
ATR for border security, safety systems to identify objects or people on a subway track, automated vehicles, and many others. Target recognition has...
States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior...
the cruise missile and bombing attacks was to strike military and securitytargets in Iraq that contributed to its ability to produce, store, maintain...
into a home within 60 seconds. Most target cash first followed by jewels, drugs, and electronics. Common security methods include never hiding extra keys...
A target ship is a vessel — typically an obsolete or captured warship — used as a seaborne target for naval gunnery practice or for weapons testing. Targets...
Target fixation is an attentional phenomenon observed in humans in which an individual becomes so focused on an observed object (be it a target or hazard)...