Aruba 620 Specifiche Pagina 3

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 93
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 2
Security Target Version 1.0 9/29/2014
3
8.1.1 Security Objectives Rationale for the TOE and Environment .............................................................. 80
8.2 SECURITY REQUIREMENTS RATIONALE ........................................................................................................ 84
8.2.1 Security Functional Requirements Rationale....................................................................................... 84
8.3 SECURITY ASSURANCE REQUIREMENTS RATIONALE .................................................................................... 91
8.4 REQUIREMENT DEPENDENCY RATIONALE .................................................................................................... 91
8.5 TOE SUMMARY SPECIFICATION RATIONALE ................................................................................................ 92
LIST OF TABLES
Table 1 TOE Security Functional Components ...................................................................................................... 23
Table 2 Audit Events ................................................................................................................................................. 27
Table 3 EAL 1 Assurance Components ................................................................................................................... 55
Table 4 Cryptographic Functions ............................................................................................................................ 64
Table 5 NIST SP800-56A Conformance .................................................................................................................. 64
Table 6 NIST SP800-56B Conformance .................................................................................................................. 65
Table 7 Environment to Objective Correspondence .............................................................................................. 80
Table 8 Objective to Requirement Correspondence ............................................................................................... 85
Table 9 Requirement Dependencies ......................................................................................................................... 92
Table 10 Security Functions vs. Requirements Mapping ....................................................................................... 93
Vedere la pagina 2
1 2 3 4 5 6 7 8 ... 92 93

Commenti su questo manuale

Nessun commento