Cisco IPS4345 Bedienungsanleitung Seite 4

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 61
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 3
Cisco Intrusion Prevention System Security Target
4
List of Tables
TABLE 1: ACRONYMS .......................................................................................................................................................................................... 5
TABLE 2: ST AND TOE IDENTIFICATION ........................................................................................................................................................ 7
TABLE 3: OPERATIONAL ENVIRONMENT COMPONENTS ............................................................................................................................. 12
TABLE 4: TOE SPECIFICATIONS...................................................................................................................................................................... 14
TABLE 5: TOE PROVIDED CRYPTOGRAPHY .................................................................................................................................................. 16
TABLE 6: EXCLUDED FUNCTIONALITY ........................................................................................................................................................... 17
TABLE 7: PROTECTION PROFILES .................................................................................................................................................................... 19
TABLE 8: TOE ASSUMPTIONS ......................................................................................................................................................................... 21
TABLE 9: THREATS............................................................................................................................................................................................ 22
TABLE 10: ORGANIZATIONAL SECURITY POLICIES ...................................................................................................................................... 22
TABLE 11: SECURITY OBJECTIVES FOR THE TOE ........................................................................................................................................ 23
TABLE 12: SECURITY OBJECTIVES FOR THE ENVIRONMENT ...................................................................................................................... 24
TABLE 13: TRACING OF SECURITY OBJECTIVES TO SPD ............................................................................................................................. 24
TABLE 14: ASSUMPTION RATIONALE ............................................................................................................................................................ 25
TABLE 15: THREAT AND OSP RATIONALE ................................................................................................................................................... 25
TABLE 16: SECURITY FUNCTIONAL REQUIREMENTS .................................................................................................................................. 27
TABLE 17 AUDITABLE EVENTS ....................................................................................................................................................................... 29
TABLE 18: RATIONALE FOR EXPLICITLY STATED REQUIREMENTS .......................................................................................................... 36
TABLE 19: SFR DEPENDENCY RATIONALE ................................................................................................................................................... 37
TABLE 20: ASSURANCE MEASURES................................................................................................................................................................. 39
TABLE 21: ASSURANCE MEASURES................................................................................................................................................................. 39
TABLE 22: SECURITY REQUIREMENTS MAPPING TO OBJECTIVES ............................................................................................................ 41
TABLE 23: HOW THE SFRS ARE SATISFIED .................................................................................................................................................. 42
TABLE 24: TOE KEY ZEROIZATION ................................................................................................................................................................ 49
TABLE 25 800-56A COMPLIANCE ................................................................................................................................................................. 49
TABLE 26 800-56B COMPLIANCE ................................................................................................................................................................. 55
TABLE 27: REFERENCES ................................................................................................................................................................................... 61
List of Figures
FIGURE 1 EXAMPLE TOE DEPLOYMENT .................................................................................................................................................... 13
Seitenansicht 3
1 2 3 4 5 6 7 8 9 ... 60 61

Kommentare zu diesen Handbüchern

Keine Kommentare