ISO 15408 Standard

Uscita

Domanda 1 of 1

  Tempo Rimasto


0 [{"id":46838,"quiz_id":"3788","answer_id":null,"answerType_id":"3","created_at":"2016-03-20 14:37:42","updated_at":"2016-03-20 14:49:32","questionName":"Organize the evaluation of countermeasures from the Security Targets perspective","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":15,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46820,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:26:49","updated_at":"2016-03-20 14:49:32","questionName":"Describe the countermeasures for which correctness will not be determined in the evaluation.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":13,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46857,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:47:43","updated_at":"2016-03-20 14:49:32","questionName":"Intended to describe a TOE type (e.g. firewalls).","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":21,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46847,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:41:23","updated_at":"2016-03-20 14:49:32","questionName":"Carried out by applying the Security Target evaluation criteria (which are defined in ISO\/IEC 15408-3) to the Security Target.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":18,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46842,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:39:49","updated_at":"2016-03-20 14:49:32","questionName":"The sufficiency of the TOE and the operational environment are determined;","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":16,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46845,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:40:34","updated_at":"2016-03-20 14:49:32","questionName":"The correctness of the TOE is determined.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":17,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46850,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:42:15","updated_at":"2016-03-20 14:49:32","questionName":"Consists of applying the SARs (from the Security Target) to the evaluation evidence.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":19,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46810,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:21:50","updated_at":"2016-03-20 14:49:32","questionName":"In an evaluation, the countermeasures is analysed through a construct called the Security Target.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":10,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46808,"quiz_id":"3788","answer_id":null,"answerType_id":"2","created_at":"2016-03-20 14:19:10","updated_at":"2016-03-20 14:49:32","questionName":"Create the sentence for the safeguarding of assets model.","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":8,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46815,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:23:51","updated_at":"2016-03-20 14:49:32","questionName":"Implementation-dependent statement of security needs for a specific identified TOE","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":11,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46856,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:46:01","updated_at":"2016-03-20 14:49:32","questionName":"A named set of security requirements that are either functional or assurance","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":20,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46826,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:30:42","updated_at":"2016-03-20 14:49:32","questionName":"What is always in the Operational Environment and considered a non-IT countermeasure?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":14,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46809,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:19:49","updated_at":"2016-03-20 14:49:32","questionName":"Safeguarding assets of interest is the responsibility of...","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":9,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":46817,"quiz_id":"3788","answer_id":null,"answerType_id":"0","created_at":"2016-03-20 14:25:12","updated_at":"2016-03-20 14:49:32","questionName":"Describe the countermeasure(s) for which correctness will be determined in the evaluation","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":12,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null}]
46838
0
120
block

Organize the evaluation of countermeasures from the Security Targets perspective

Abbina il testo (clicca e trascina)   

(0/0)




Abbina Il Testo

1

2

3

4

5

6

Clicca e trascina

Demonstrates that these countermeasures are sufficient to counter these threats

Describing the assets and the threats to those assets

Describes the countermeasures

Evaluation of ST/TOE and evaluation of PPs

Divides countermeasures into security objectives for the TOE and security objectives for the Operational Environment

Determine correctness of the TOE and correctness of the Operational Environment


46820
0
120
none
46857
0
120
none
46847
0
120
none
46842
0
120
none
46845
0
120
none
46850
0
120
none
46810
0
120
none
46808
0
120
none
46815
0
120
none
46856
0
120
none
46826
0
120
none
46809
0
120
none
46817
0
120
none