Thursday 22 November 2012

Commercial Database Management System Protection

Contents
1 Introduction ....................................................................... 1
1.1 Identification of Protection Profile .................................... 1
1.2 Protection Profile Overview ............................................... 1
2 Target of Evaluation (TOE) Description .......................... 2
3 Security Environment ....................................................... 3
3.1 Threats ................................................................................ 3
3.2 Organisational Security Policies ....................................... 5
3.3 Secure Usage Assumptions ................................................. 5
4 Security Objectives ........................................................... 7
4.1 IT Security Objectives ........................................................ 7
4.2 Non-IT Security Objectives ................................................ 8
5 IT Security Requirements ............................................... 11
5.1 TOE IT Security Functional Requirements ...................... 11

Click here 

Commercial Database Management System Protection

0 comments:

Post a Comment