Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
English-book.doc
Скачиваний:
198
Добавлен:
01.06.2015
Размер:
6.25 Mб
Скачать

6. Answer the following questions.

What is the purpose of creating this standard?

What is the sphere of CC application?

What is meant by TOE?

How do parties use the standard?

What are the main types of security failure?

What are the categories of protection related to them?

7. Mark the following statements true or false. Correct the false statements.

  1. Common Criteria is created as a common set of requirements for developing IT products and systems.

  2. Consumers of IT products and system can use this standard while assessing the security of their purchase.

  3. During evaluation, an IT product or system is known as a Security Target of Evaluation.

  4. Integrity is the category of information protection relating to the failure of security called unauthorized disclosure.

  5. The CC is used to IT security measures implemented in software.

  6. The CC concentrates on malicious human threats.

  7. This standard is possible to use in any IT sphere.

Vocabulary tasks

8. Form the word combinations and give their definitions.

Security, protection, evaluation.

9. Complete the sentences using the words given below.

Require, judgments, inspection, certification, a set.

  1. The certification process is the independent ________ of the results of the evaluation leading to the production of the final certificate or approval.

  2. The CC is presented as __________ of distinct but related parts.

  3. The evaluation scheme, methodology and __________ processes are the responsibility of evaluation authorities that run evaluation scheme.

  4. Many of the evaluation criteria _________ the application of expert judgments and background knowledge for which consistency is more difficult to achieve.

  5. The CC contains criteria to be used by evaluators when forming __________ about the conformance of TOEs to the security requirements.

10. Make the word combinations.

1. distributed

a) profile

2. fulfill

b) comparability

3. make

c) disclosure

4. permit

d) the requirements

5. loss

e) measures

6. security

f) claims

7. protection

g) of use

8. assurance

h) system

9. unauthorized

i) function

10. meet

j) the needs

11. Match the term and its definition.

  1. Evaluation authority

  2. Target of Evaluation

  3. Assets

  4. Augmentation

  5. Protection Profile

  1. information or resources to be protected by the countermeasures of a TOE.

  2. the addition of one or more assurance components from Part 3 to an EAL or assurance package.

  3. a body that implements the CC for a specific community by means of evaluation scheme and thereby sets the standards and monitors the quality of evaluation.

  4. an implementation-independent set of security requirements for a category of TOEs that meets specific consumer needs.

  5. an IT product or system and its associated administrator and user guidance documentation that is the subject of an evaluation.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]