Data Protection and Security

   

VI

Operating System Security and Secure Programming

   

VI.III

Security Evaluation

   

   
 

Target of the Evaluation:

Evaluation criteria refer to either

  • Products: We have to find an accepted set of generic requirements (Security classes of Orange Book and the protection profile of Federal and Common Criteria)
  • Systems: Requirements capture and analysis becomes part of each individual evaluation (ITSEC).
   

VI.III.I Q

[+] Question

[-] Question

Where is the borderline between a security evaluation and the task of security consultancy?

   

   
       
 
«previous session [1] [2] [3] [4] [5] [6] [7] [8] [9] next session »
   
       
 
«proceed to previous sectionproceed to next section »
  chapter index