Aruba 620 Specifikace Strana 3

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 93
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 2
Security Target Version 1.0 9/29/2014
3
8.1.1 Security Objectives Rationale for the TOE and Environment .............................................................. 80
8.2 SECURITY REQUIREMENTS RATIONALE ........................................................................................................ 84
8.2.1 Security Functional Requirements Rationale....................................................................................... 84
8.3 SECURITY ASSURANCE REQUIREMENTS RATIONALE .................................................................................... 91
8.4 REQUIREMENT DEPENDENCY RATIONALE .................................................................................................... 91
8.5 TOE SUMMARY SPECIFICATION RATIONALE ................................................................................................ 92
LIST OF TABLES
Table 1 TOE Security Functional Components ...................................................................................................... 23
Table 2 Audit Events ................................................................................................................................................. 27
Table 3 EAL 1 Assurance Components ................................................................................................................... 55
Table 4 Cryptographic Functions ............................................................................................................................ 64
Table 5 NIST SP800-56A Conformance .................................................................................................................. 64
Table 6 NIST SP800-56B Conformance .................................................................................................................. 65
Table 7 Environment to Objective Correspondence .............................................................................................. 80
Table 8 Objective to Requirement Correspondence ............................................................................................... 85
Table 9 Requirement Dependencies ......................................................................................................................... 92
Table 10 Security Functions vs. Requirements Mapping ....................................................................................... 93
Zobrazit stránku 2
1 2 3 4 5 6 7 8 ... 92 93

Komentáře k této Příručce

Žádné komentáře