McAfee HARDWARE 1.4 Przewodnik Instalacji Strona 4

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 61
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 3
McAfee Email Gateway
Security Target
McAfee Incorporated
Page 4 of 61
Table 5 - Physical Scope and Boundary: Software .....................................................................................16
Table 6 - Assumptions .................................................................................................................................21
Table 7 - Threats .........................................................................................................................................22
Table 8 - Organisational security policy.......................................................................................................22
Table 9 - Security objectives for the TOE ....................................................................................................23
Table 10 - Security objectives for the environment .....................................................................................24
Table 11 - Security Problem & IT Security Objectives Mappings ................................................................25
Table 12 - TOE Security Functional Requirements .....................................................................................28
Table 13 - TOE Security Functional Requirements and Auditable Events ..................................................42
Table 14 - Assurance Requirements ...........................................................................................................49
Table 15 - Security objective mapping rationale .........................................................................................50
Table 16 - SFR dependencies .....................................................................................................................52
Table 17 CAVP Algorithm Certificates......................................................................................................59
Table 18 - SFR to Security Functions mapping ...........................................................................................61
Przeglądanie stron 3
1 2 3 4 5 6 7 8 9 ... 60 61

Komentarze do niniejszej Instrukcji

Brak uwag