The Common Criteria for Information Technology Security Evaluation (referred to as Common Criteria or CC) is an international standard (ISO/IEC 15408)... 30 KB (3,714 words) - 14:36, 9 February 2024 |
system is a numerical grade assigned following the completion of a Common Criteria security evaluation, an international standard in effect since 1999... 17 KB (1,772 words) - 10:46, 21 March 2024 |
The Common Criteria model provides for the separation of the roles of evaluator and certifier. Product certificates are awarded by national schemes on... 7 KB (839 words) - 03:02, 26 April 2022 |
The Common Terminology Criteria for Adverse Events (CTCAE), formerly called the Common Toxicity Criteria (CTC or NCI-CTC), are a set of criteria for the... 2 KB (272 words) - 02:32, 16 May 2023 |
A.R.T. (or SMART) is an acronym used as a mnemonic device to establish criteria for effective goal-setting and objective development. This framework is... 18 KB (1,640 words) - 19:03, 23 March 2024 |
government requirements. The most common set of criteria for trusted operating system design is the Common Criteria combined with the Security Functional... 4 KB (406 words) - 08:23, 27 March 2023 |
string-like tendons felt on either side of the back of the knee. The common criteria of any hamstring muscles are: Muscles should originate from ischial... 10 KB (998 words) - 21:24, 19 March 2024 |
additional supplemental criteria are shared among the Trust Services Criteria - Common Criteria (CC) and additional specific criteria for availability, processing... 9 KB (1,040 words) - 12:16, 5 March 2024 |
Operations Checklist for Cryptographic Module Testing A CMTL can also be a Common Criteria (CC) Testing Laboratory (CCTL). The CC and FIPS 140-2 are different... 3 KB (387 words) - 08:21, 1 March 2024 |
part of the certification process according to ISO/IEC 15408 and the Common Criteria (CC). As the generic form of a Security Target (ST), it is typically... 5 KB (606 words) - 10:12, 12 March 2023 |
Common Criteria for Information Technology Security Evaluation, version 3.1 Part 1 (called CC 3.1 or CC) defines the Security Target (ST) as an... 5 KB (663 words) - 08:18, 1 March 2024 |
The Copenhagen criteria are the rules that define whether a country is eligible to join the European Union. The criteria require that a state has the... 24 KB (3,208 words) - 05:23, 23 December 2023 |
pump work. Non-corrosivity and compatibility with common system materials are important selection criteria. The fluid should be chemically stable over the... 19 KB (2,461 words) - 17:12, 21 March 2024 |
security solution to achieve the EAL2+ security certification under the Common Criteria standard, published in the BOE (Official State Bulletin) in May 2018... 16 KB (1,313 words) - 08:43, 15 March 2024 |
Noun class (section Common criteria for noun classes) extensively categorized by independent particles called noun classifiers. Common criteria that define noun classes include: animate vs. inanimate (as in Ojibwe)... 22 KB (2,706 words) - 02:54, 2 February 2024 |
The Bradford Hill criteria, otherwise known as Hill's criteria for causation, are a group of nine principles that can be useful in establishing epidemiologic... 16 KB (1,925 words) - 14:04, 28 March 2024 |
and the European ITSEC approaches. CTCPEC led to the creation of the Common Criteria standard. The Canadian System Security Centre, part of the Communications... 2 KB (183 words) - 04:12, 24 July 2023 |
embedded in other standards such as ETSI SCP (now SET) since release 7. A Common Criteria Secure Element Protection Profile has been released targeting EAL4+... 6 KB (496 words) - 02:21, 23 February 2024 |
competence. The common criteria for each category are content, originality, and widespread appeal; each category also has additional criteria appropriate... 3 KB (139 words) - 15:59, 25 January 2024 |
ITSEC (redirect from Information Technology Security Evaluation Criteria) validity of ITSEC evaluations. The ITSEC has been largely replaced by Common Criteria, which provides similarly-defined evaluation levels and implements... 4 KB (414 words) - 01:54, 27 January 2022 |
designations in Singapore and Germany, including certified international Common Criteria standard (ISO 15408, CC Version 3.1). On October 28, 2021, the company... 63 KB (4,403 words) - 07:25, 2 March 2024 |
external security-auditing organization, the most popular evaluations are Common Criteria (CC) and FIPS 140-2. Trusted Solaris 8 was a security-focused version... 12 KB (1,103 words) - 19:28, 1 March 2024 |
Intel 80386-based. Currently, MLS products are evaluated under the Common Criteria. In late 2008, the first operating system (more below) was certified... 31 KB (4,178 words) - 20:28, 27 March 2024 |
warranted significant confidence in certifications based on these criteria. The Common Criteria is based on this science and it intended to preserve the Assurance... 22 KB (2,553 words) - 16:30, 7 February 2024 |
needed] MarkLogic maintains ACID consistency for transactions and has a Common Criteria certification security model, high availability, and disaster recovery... 13 KB (1,093 words) - 23:47, 22 March 2024 |