McAfee HARDWARE 1.4 Guide d'installation Page 4

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 61
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 3
McAfee Email Gateway
Security Target
McAfee Incorporated
Page 4 of 61
Table 5 - Physical Scope and Boundary: Software .....................................................................................16
Table 6 - Assumptions .................................................................................................................................21
Table 7 - Threats .........................................................................................................................................22
Table 8 - Organisational security policy.......................................................................................................22
Table 9 - Security objectives for the TOE ....................................................................................................23
Table 10 - Security objectives for the environment .....................................................................................24
Table 11 - Security Problem & IT Security Objectives Mappings ................................................................25
Table 12 - TOE Security Functional Requirements .....................................................................................28
Table 13 - TOE Security Functional Requirements and Auditable Events ..................................................42
Table 14 - Assurance Requirements ...........................................................................................................49
Table 15 - Security objective mapping rationale .........................................................................................50
Table 16 - SFR dependencies .....................................................................................................................52
Table 17 CAVP Algorithm Certificates......................................................................................................59
Table 18 - SFR to Security Functions mapping ...........................................................................................61
Vue de la page 3
1 2 3 4 5 6 7 8 9 ... 60 61

Commentaires sur ces manuels

Pas de commentaire