• The Common Criteria for Information Technology Security Evaluation (referred to as Common Criteria or CC) is an international standard (ISO/IEC 15408)...
    30 KB (3,714 words) - 14:36, 9 February 2024
  • system is a numerical grade assigned following the completion of a Common Criteria security evaluation, an international standard in effect since 1999...
    17 KB (1,772 words) - 10:46, 21 March 2024
  • The Common Criteria model provides for the separation of the roles of evaluator and certifier. Product certificates are awarded by national schemes on...
    7 KB (839 words) - 03:02, 26 April 2022
  • The Common Terminology Criteria for Adverse Events (CTCAE), formerly called the Common Toxicity Criteria (CTC or NCI-CTC), are a set of criteria for the...
    2 KB (272 words) - 02:32, 16 May 2023
  • Thumbnail for SMART criteria
    A.R.T. (or SMART) is an acronym used as a mnemonic device to establish criteria for effective goal-setting and objective development. This framework is...
    18 KB (1,640 words) - 19:03, 23 March 2024
  • Thumbnail for Trusted Computer System Evaluation Criteria
    Agency, and then updated in 1985, TCSEC was eventually replaced by the Common Criteria international standard, originally published in 2005.[citation needed]...
    18 KB (2,101 words) - 21:38, 25 February 2024
  • government requirements. The most common set of criteria for trusted operating system design is the Common Criteria combined with the Security Functional...
    4 KB (406 words) - 08:23, 27 March 2023
  • Thumbnail for Hamstring
    Hamstring (section Criteria)
    string-like tendons felt on either side of the back of the knee. The common criteria of any hamstring muscles are: Muscles should originate from ischial...
    10 KB (998 words) - 21:24, 19 March 2024
  • additional supplemental criteria are shared among the Trust Services Criteria - Common Criteria (CC) and additional specific criteria for availability, processing...
    9 KB (1,040 words) - 12:16, 5 March 2024
  • Operations Checklist for Cryptographic Module Testing A CMTL can also be a Common Criteria (CC) Testing Laboratory (CCTL). The CC and FIPS 140-2 are different...
    3 KB (387 words) - 08:21, 1 March 2024
  • Thumbnail for Hardware security module
    code. These execution engines protect the status of an HSM's FIPS or Common Criteria validation. Due to the critical role they play in securing applications...
    18 KB (1,949 words) - 06:10, 9 February 2024
  • part of the certification process according to ISO/IEC 15408 and the Common Criteria (CC). As the generic form of a Security Target (ST), it is typically...
    5 KB (606 words) - 10:12, 12 March 2023
  • Common Criteria for Information Technology Security Evaluation, version 3.1 Part 1 (called CC 3.1 or CC) defines the Security Target (ST) as an...
    5 KB (663 words) - 08:18, 1 March 2024
  • Thumbnail for Copenhagen criteria
    The Copenhagen criteria are the rules that define whether a country is eligible to join the European Union. The criteria require that a state has the...
    24 KB (3,208 words) - 05:23, 23 December 2023
  • pump work. Non-corrosivity and compatibility with common system materials are important selection criteria. The fluid should be chemically stable over the...
    19 KB (2,461 words) - 17:12, 21 March 2024
  • security solution to achieve the EAL2+ security certification under the Common Criteria standard, published in the BOE (Official State Bulletin) in May 2018...
    16 KB (1,313 words) - 08:43, 15 March 2024
  • extensively categorized by independent particles called noun classifiers. Common criteria that define noun classes include: animate vs. inanimate (as in Ojibwe)...
    22 KB (2,706 words) - 02:54, 2 February 2024
  • The Bradford Hill criteria, otherwise known as Hill's criteria for causation, are a group of nine principles that can be useful in establishing epidemiologic...
    16 KB (1,925 words) - 14:04, 28 March 2024
  • Thumbnail for Common Criteria Evaluation and Validation Scheme
    Common Criteria Evaluation and Validation Scheme (CCEVS) is a United States Government program administered by the National Information Assurance Partnership...
    4 KB (452 words) - 16:44, 14 November 2023
  • Thumbnail for Hardware random number generator
    satisfy the requirements of Federal Information Processing Standards and Common Criteria standards. Hardware random generators can be used in any application...
    27 KB (3,204 words) - 08:11, 6 February 2024
  • and the European ITSEC approaches. CTCPEC led to the creation of the Common Criteria standard. The Canadian System Security Centre, part of the Communications...
    2 KB (183 words) - 04:12, 24 July 2023
  • embedded in other standards such as ETSI SCP (now SET) since release 7. A Common Criteria Secure Element Protection Profile has been released targeting EAL4+...
    6 KB (496 words) - 02:21, 23 February 2024
  • competence. The common criteria for each category are content, originality, and widespread appeal; each category also has additional criteria appropriate...
    3 KB (139 words) - 15:59, 25 January 2024
  • validity of ITSEC evaluations. The ITSEC has been largely replaced by Common Criteria, which provides similarly-defined evaluation levels and implements...
    4 KB (414 words) - 01:54, 27 January 2022
  • designations in Singapore and Germany, including certified international Common Criteria standard (ISO 15408, CC Version 3.1). On October 28, 2021, the company...
    63 KB (4,403 words) - 07:25, 2 March 2024
  • external security-auditing organization, the most popular evaluations are Common Criteria (CC) and FIPS 140-2. Trusted Solaris 8 was a security-focused version...
    12 KB (1,103 words) - 19:28, 1 March 2024
  • Intel 80386-based. Currently, MLS products are evaluated under the Common Criteria. In late 2008, the first operating system (more below) was certified...
    31 KB (4,178 words) - 20:28, 27 March 2024
  • Thumbnail for Infoblox
    Newest Participating Organization," BusinessWire, retrieved 11/1/13. Common Criteria Certified Companies list, retrieved 11/1/13. ā€¯Infoblox Earns Approval...
    15 KB (1,377 words) - 14:53, 23 February 2024
  • warranted significant confidence in certifications based on these criteria. The Common Criteria is based on this science and it intended to preserve the Assurance...
    22 KB (2,553 words) - 16:30, 7 February 2024
  • needed] MarkLogic maintains ACID consistency for transactions and has a Common Criteria certification security model, high availability, and disaster recovery...
    13 KB (1,093 words) - 23:47, 22 March 2024