ISO 15408 Standard

बाहर जाएं

सवाल 1 of 1

  शेष समय


0 [{"id":46838,"quiz_id":"3788","answer_id":null,"answerType_id":"3","created_at":"2016-03-20 14:37:42","updated_at":"2016-03-20 14:49:32","questionName":"Organize the evaluation of countermeasures from the Security Targets perspective","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":15,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46826,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:30:42","updated_at":"2016-03-20 14:49:32","questionName":"What is always in the Operational Environment and considered a non-IT countermeasure?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":14,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46809,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:19:49","updated_at":"2016-03-20 14:49:32","questionName":"Safeguarding assets of interest is the responsibility of...","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":9,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46845,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:40:34","updated_at":"2016-03-20 14:49:32","questionName":"The correctness of the TOE is determined.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":17,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46850,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:42:15","updated_at":"2016-03-20 14:49:32","questionName":"Consists of applying the SARs (from the Security Target) to the evaluation evidence.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":19,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46856,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:46:01","updated_at":"2016-03-20 14:49:32","questionName":"A named set of security requirements that are either functional or assurance","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":20,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46842,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:39:49","updated_at":"2016-03-20 14:49:32","questionName":"The sufficiency of the TOE and the operational environment are determined;","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":16,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46857,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:47:43","updated_at":"2016-03-20 14:49:32","questionName":"Intended to describe a TOE type (e.g. firewalls).","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":21,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46815,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:23:51","updated_at":"2016-03-20 14:49:32","questionName":"Implementation-dependent statement of security needs for a specific identified TOE","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":11,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46817,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:25:12","updated_at":"2016-03-20 14:49:32","questionName":"Describe the countermeasure(s) for which correctness will be determined in the evaluation","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":12,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46847,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:41:23","updated_at":"2016-03-20 14:49:32","questionName":"Carried out by applying the Security Target evaluation criteria (which are defined in ISO\/IEC 15408-3) to the Security Target.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":18,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46810,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:21:50","updated_at":"2016-03-20 14:49:32","questionName":"In an evaluation, the countermeasures is analysed through a construct called the Security Target.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":10,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46820,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:26:49","updated_at":"2016-03-20 14:49:32","questionName":"Describe the countermeasures for which correctness will not be determined in the evaluation.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":13,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46808,"quiz_id":"3788","answer_id":null,"answerType_id":"2","created_at":"2016-03-20 14:19:10","updated_at":"2016-03-20 14:49:32","questionName":"Create the sentence for the safeguarding of assets model.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":8,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null}]
46838
0
120
block

Organize the evaluation of countermeasures from the Security Targets perspective

टेक्स्ट से मिलान करें (क्लिक करें और खींचें)   

(0/0)




पाठ से मेल खाते हैं

1

2

3

4

5

6

क्लिक करें और खींचें

Determine correctness of the TOE and correctness of the Operational Environment

Demonstrates that these countermeasures are sufficient to counter these threats

Evaluation of ST/TOE and evaluation of PPs

Describes the countermeasures

Describing the assets and the threats to those assets

Divides countermeasures into security objectives for the TOE and security objectives for the Operational Environment


46826
0
120
none
46809
0
120
none
46845
0
120
none
46850
0
120
none
46856
0
120
none
46842
0
120
none
46857
0
120
none
46815
0
120
none
46817
0
120
none
46847
0
120
none
46810
0
120
none
46820
0
120
none
46808
0
120
none