Cisco IPS4345 Instrukcja Użytkownika Strona 4

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 61
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 3
Cisco Intrusion Prevention System Security Target
4
List of Tables
TABLE 1: ACRONYMS .......................................................................................................................................................................................... 5
TABLE 2: ST AND TOE IDENTIFICATION ........................................................................................................................................................ 7
TABLE 3: OPERATIONAL ENVIRONMENT COMPONENTS ............................................................................................................................. 12
TABLE 4: TOE SPECIFICATIONS...................................................................................................................................................................... 14
TABLE 5: TOE PROVIDED CRYPTOGRAPHY .................................................................................................................................................. 16
TABLE 6: EXCLUDED FUNCTIONALITY ........................................................................................................................................................... 17
TABLE 7: PROTECTION PROFILES .................................................................................................................................................................... 19
TABLE 8: TOE ASSUMPTIONS ......................................................................................................................................................................... 21
TABLE 9: THREATS............................................................................................................................................................................................ 22
TABLE 10: ORGANIZATIONAL SECURITY POLICIES ...................................................................................................................................... 22
TABLE 11: SECURITY OBJECTIVES FOR THE TOE ........................................................................................................................................ 23
TABLE 12: SECURITY OBJECTIVES FOR THE ENVIRONMENT ...................................................................................................................... 24
TABLE 13: TRACING OF SECURITY OBJECTIVES TO SPD ............................................................................................................................. 24
TABLE 14: ASSUMPTION RATIONALE ............................................................................................................................................................ 25
TABLE 15: THREAT AND OSP RATIONALE ................................................................................................................................................... 25
TABLE 16: SECURITY FUNCTIONAL REQUIREMENTS .................................................................................................................................. 27
TABLE 17 AUDITABLE EVENTS ....................................................................................................................................................................... 29
TABLE 18: RATIONALE FOR EXPLICITLY STATED REQUIREMENTS .......................................................................................................... 36
TABLE 19: SFR DEPENDENCY RATIONALE ................................................................................................................................................... 37
TABLE 20: ASSURANCE MEASURES................................................................................................................................................................. 39
TABLE 21: ASSURANCE MEASURES................................................................................................................................................................. 39
TABLE 22: SECURITY REQUIREMENTS MAPPING TO OBJECTIVES ............................................................................................................ 41
TABLE 23: HOW THE SFRS ARE SATISFIED .................................................................................................................................................. 42
TABLE 24: TOE KEY ZEROIZATION ................................................................................................................................................................ 49
TABLE 25 800-56A COMPLIANCE ................................................................................................................................................................. 49
TABLE 26 800-56B COMPLIANCE ................................................................................................................................................................. 55
TABLE 27: REFERENCES ................................................................................................................................................................................... 61
List of Figures
FIGURE 1 EXAMPLE TOE DEPLOYMENT .................................................................................................................................................... 13
Przeglądanie stron 3
1 2 3 4 5 6 7 8 9 ... 60 61

Komentarze do niniejszej Instrukcji

Brak uwag