McAfee HARDWARE 1.4 Instalační příručka Strana 4

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 61
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 3
McAfee Email Gateway
Security Target
McAfee Incorporated
Page 4 of 61
Table 5 - Physical Scope and Boundary: Software .....................................................................................16
Table 6 - Assumptions .................................................................................................................................21
Table 7 - Threats .........................................................................................................................................22
Table 8 - Organisational security policy.......................................................................................................22
Table 9 - Security objectives for the TOE ....................................................................................................23
Table 10 - Security objectives for the environment .....................................................................................24
Table 11 - Security Problem & IT Security Objectives Mappings ................................................................25
Table 12 - TOE Security Functional Requirements .....................................................................................28
Table 13 - TOE Security Functional Requirements and Auditable Events ..................................................42
Table 14 - Assurance Requirements ...........................................................................................................49
Table 15 - Security objective mapping rationale .........................................................................................50
Table 16 - SFR dependencies .....................................................................................................................52
Table 17 CAVP Algorithm Certificates......................................................................................................59
Table 18 - SFR to Security Functions mapping ...........................................................................................61
Zobrazit stránku 3
1 2 3 4 5 6 7 8 9 ... 60 61

Komentáře k této Příručce

Žádné komentáře