Are you over 18 and want to see adult content?
More Annotations
A complete backup of https://democraticunderground.com/
Are you over 18 and want to see adult content?
A complete backup of https://savagenoir.blogspot.com/
Are you over 18 and want to see adult content?
A complete backup of https://sattamatka.software/
Are you over 18 and want to see adult content?
A complete backup of https://aquadude2001.wordpress.com/2021/02/15/the-two-hundredth-and-ninety-seventh-of-one-thousand-and-one-
Are you over 18 and want to see adult content?
A complete backup of http://ji.ru.net/v/52114
Are you over 18 and want to see adult content?
A complete backup of https://www.creta.gr/category/trofima-oinoi-pota-4/2
Are you over 18 and want to see adult content?
A complete backup of https://en.wikipedia.org/wiki/Hurricane_Zeta_(2020)
Are you over 18 and want to see adult content?
A complete backup of https://sehuatang.net/thread-444049-1-1.html
Are you over 18 and want to see adult content?
A complete backup of https://balkanje.com/zavet-2020-epizoda-44/
Are you over 18 and want to see adult content?
A complete backup of https://javier-solis.yump3.me/
Are you over 18 and want to see adult content?
Favourite Annotations
A complete backup of promedical.com.ua
Are you over 18 and want to see adult content?
A complete backup of ncchildsupport.com
Are you over 18 and want to see adult content?
A complete backup of munthypotheken.nl
Are you over 18 and want to see adult content?
A complete backup of operatorfoundation.org
Are you over 18 and want to see adult content?
A complete backup of pizzadanet.blogspot.com
Are you over 18 and want to see adult content?
A complete backup of barakuda-shop.com
Are you over 18 and want to see adult content?
Text
the original
CERTIFIED PRODUCTS : CC PORTAL Compliance. Scheme. This list was generated on Sunday, May 23, 2021, at 12:28 AM. Access Control Devices and Systems – 26 Certified Products. DriveLock Agent 2019.2 (Device and Application Control) SP 1. Certification Report Security Target. DriveLock SE. CCRACertificate.
COMMON CRITERIA FOR INFORMATION TECHNOLOGY SECURITY EVALUATION Page 2 of 106 Version 3.1 April 2017 Foreword This version of the Common Criteria for Information Technology Security Evaluation (CC v3.1) is the first major revision since being published as COMMON METHODOLOGY FOR INFORMATION TECHNOLOGY SECURITY Page 2 of 430 Version 3.1 April 2017 Foreword This version of the Common Methodology for Information Technology Security Evaluation (CEM v3.1) is the first major revision sinceSECURITY TARGET
INTERNAL 7/20 1 Security Target Introduction (ASE_INT.1) 1.1 Security Target Reference ST Title Fort Fox Hardware Data Diode Security Target ST Version 2.06 ST Status Final ST Classification Internal Author Bartek Gedrojc (Fox-IT) Advisor Dirk-Jan Out (Brightsight) Evaluation Assurance Level EAL4+, augmented with AVA_VAN.5 and ALC_DVS.2 Publication Data September 23, 2011ST INCARD S.R
Certification Report V1.0 ZS-01-01-F-326 V4.1 BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn ADVANTAGES AND DRAWBACKS TO USE CC FOR PRIVATE SCHEMES Advantages and drawbacks to use CC for private schemes Francois GUERIN Security Program Manager francois.guerin@gemalto.com MOTOROLA NETWORK DEVICES S2500, S6000, GGM 8000 SECURITY Motorola Network Device Security Target 2009-2012 Motorola Solutions® Inc. 1 Motorola Network Devices S2500, S6000, GGM 8000 Security Target EAL 2 augmented ALC_FLR.2 Release Date: June 13, 2012 Document ID:09-1757-R-0057
ASSURANCE CONTINUITY: CCRA REQUIREMENTS Assurance Continuity: CCRA Requirements June 2012 version 2.1 Page 3of 22
COMMON CRITERIA : CC PORTALNEWSICCCPROTECTION PROFILESCOLLABORATIVE PPSCERTIFIED PRODUCTS The Common Criteria for Information Technology Security Evaluation (CC), and the companion Common Methodology for Information Technology Security Evaluation (CEM) are the technical basis for an international agreement, the Common Criteria Recognition Arrangement (CCRA), which ensures that: . Products can be evaluated by competent and independent licensed laboratories ABOUT THE COMMON CRITERIA : CC PORTALLOGINCOMMON CRITERIACERTIFICATE AUTHORIZING SCHEMESCERTIFIED PRODUCTSNEWSCPP The purpose of this Arrangement is to advance those objectives by bringing about a situation in which IT products and protection profiles which earn a Common Criteria certificate can be procured or used without the need for further evaluation. It seeks to provide grounds for confidence in the reliability of the judgements on whichthe original
CERTIFIED PRODUCTS : CC PORTAL Compliance. Scheme. This list was generated on Sunday, May 23, 2021, at 12:28 AM. Access Control Devices and Systems – 26 Certified Products. DriveLock Agent 2019.2 (Device and Application Control) SP 1. Certification Report Security Target. DriveLock SE. CCRACertificate.
COMMON CRITERIA FOR INFORMATION TECHNOLOGY SECURITY EVALUATION Page 2 of 106 Version 3.1 April 2017 Foreword This version of the Common Criteria for Information Technology Security Evaluation (CC v3.1) is the first major revision since being published as COMMON METHODOLOGY FOR INFORMATION TECHNOLOGY SECURITY Page 2 of 430 Version 3.1 April 2017 Foreword This version of the Common Methodology for Information Technology Security Evaluation (CEM v3.1) is the first major revision sinceSECURITY TARGET
INTERNAL 7/20 1 Security Target Introduction (ASE_INT.1) 1.1 Security Target Reference ST Title Fort Fox Hardware Data Diode Security Target ST Version 2.06 ST Status Final ST Classification Internal Author Bartek Gedrojc (Fox-IT) Advisor Dirk-Jan Out (Brightsight) Evaluation Assurance Level EAL4+, augmented with AVA_VAN.5 and ALC_DVS.2 Publication Data September 23, 2011ST INCARD S.R
Certification Report V1.0 ZS-01-01-F-326 V4.1 BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn ADVANTAGES AND DRAWBACKS TO USE CC FOR PRIVATE SCHEMES Advantages and drawbacks to use CC for private schemes Francois GUERIN Security Program Manager francois.guerin@gemalto.com MOTOROLA NETWORK DEVICES S2500, S6000, GGM 8000 SECURITY Motorola Network Device Security Target 2009-2012 Motorola Solutions® Inc. 1 Motorola Network Devices S2500, S6000, GGM 8000 Security Target EAL 2 augmented ALC_FLR.2 Release Date: June 13, 2012 Document ID:09-1757-R-0057
ASSURANCE CONTINUITY: CCRA REQUIREMENTS Assurance Continuity: CCRA Requirements June 2012 version 2.1 Page 3of 22
CERTIFIED PRODUCTS : CC PORTAL Compliance. Scheme. This list was generated on Sunday, May 23, 2021, at 12:28 AM. Access Control Devices and Systems – 26 Certified Products. DriveLock Agent 2019.2 (Device and Application Control) SP 1. Certification Report Security Target. DriveLock SE. CCRACertificate.
GUIDELINES FOR DEVELOPER DOCUMENTATION Guidelines for Developer Documentation according to Common Criteria Version 3.1 . 1 Introduction to this Guidance . This chapter provides an overview about the purpose, the content, and the structure of NETWORK COLLABORATIVE PROTECTION PROFILE collaborative Protection Profile for Network Devices v2.2e, 23-March-2020 Page 5 of 174 0.5 Revision History Version Date Description 2.2e 2.2 23-Mar-2020 COMMON CRITERIA FOR INFORMATION TECHNOLOGY SECURITY EVALUATION Page 2 of 233 Version 3.1 September 2012 Foreword This version of the Common Criteria for Information Technology Security Evaluation (CCv3.1) is the
PROTECTION PROFILE CRYPTOGRAPHIC SERVICE PROVIDER Common Criteria Protection Profile Cryptographic Service Provider.BSI-CC-PP-0104-2019
COMMON CRITERIA INFORMATION TECHNOLOGY SECURITY EVALUATION Revision History Revision No. Date Description 0.0 26th October 2016 Creation 1.0 19th May 2017 The table 1 is updated. The chapter 1.2.4, 2.2, 6.1.17, 6.1.19, 6.3.1RSA ARCHER GRC
RSA Archer GRC Platform 6.1 Security Target Version 1.0 5 August 2016 Prepared for: 13200 Metcalf Avenue, Suite 300 Overland Park, KS 66213 US-JP PROTECTION PROFILE FOR HARDCOPY DEVICES V1 Protection Profile for Hardcopy Devices – v1.0 September 10, 2015 Page 1 . Protection Profile for Hardcopy Devices . IPA, NIAP, and the MFP Technical Community SECURITY TARGET FOR HUAWEI USN9810 V900R012 Security Target for Huawei USN9810 V900R012 Version 1.5 Date 2014-02-17 HUAWEI TECHNOLOGIES CO., LTD. STANDARD PROTECTION PROFILE FOR ENTERPRISE SECURITY Standard Protection Profile for Enterprise Security Management Access Control Page 2 Document History Version Date Comment 1.0 October 21, COMMON CRITERIA : CC PORTALNEWSICCCPROTECTION PROFILESCOLLABORATIVE PPSCERTIFIED PRODUCTS The Common Criteria for Information Technology Security Evaluation (CC), and the companion Common Methodology for Information Technology Security Evaluation (CEM) are the technical basis for an international agreement, the Common Criteria Recognition Arrangement (CCRA), which ensures that: . Products can be evaluated by competent and independent licensed laboratories CERTIFIED PRODUCTS : CC PORTAL Compliance. Scheme. This list was generated on Sunday, May 23, 2021, at 12:28 AM. Access Control Devices and Systems – 26 Certified Products. DriveLock Agent 2019.2 (Device and Application Control) SP 1. Certification Report Security Target. DriveLock SE. CCRACertificate.
ABOUT THE COMMON CRITERIA : CC PORTAL The purpose of this Arrangement is to advance those objectives by bringing about a situation in which IT products and protection profiles which earn a Common Criteria certificate can be procured or used without the need for further evaluation. It seeks to provide grounds for confidence in the reliability of the judgements on whichthe original
COMMON CRITERIA FOR INFORMATION TECHNOLOGY SECURITY EVALUATION Page 2 of 106 Version 3.1 April 2017 Foreword This version of the Common Criteria for Information Technology Security Evaluation (CC v3.1) is the first major revision since being published as GUIDELINES FOR DEVELOPER DOCUMENTATION Guidelines for Developer Documentation according to Common Criteria Version 3.1 . 1 Introduction to this Guidance . This chapter provides an overview about the purpose, the content, and the structure of this SECURE ELEMENT NXP JCOP6.X ON SN200 NXP JCOP6.x on SN200.C04 Secure Element Security Target Lite Rev. 2.1 — 10 September 2020 Product evaluation document NSCIB-CC-235773_2COMPANY PUBLIC
NETWORK COLLABORATIVE PROTECTION PROFILE collaborative Protection Profile for Network Devices v2.2e, 23-March-2020 Page 5 of 174 0.5 Revision History Version Date Description 2.2e 2.2 23-Mar-2020 MOTOROLA NETWORK DEVICES S2500, S6000, GGM 8000 SECURITY Motorola Network Device Security Target 2009-2012 Motorola Solutions® Inc. 1 Motorola Network Devices S2500, S6000, GGM 8000 Security Target EAL 2 augmented ALC_FLR.2 Release Date: June 13, 2012 Document ID:09-1757-R-0057
ADVANTAGES AND DRAWBACKS TO USE CC FOR PRIVATE SCHEMES Advantages and drawbacks to use CC for private schemes Francois GUERIN Security Program Manager francois.guerin@gemalto.com SECURITY TARGET FOR HUAWEI USN9810 V900R012 Security Target for Huawei USN9810 V900R012 Version 1.5 Date 2014-02-17 HUAWEI TECHNOLOGIES CO., LTD. COMMON CRITERIA : CC PORTALNEWSICCCPROTECTION PROFILESCOLLABORATIVE PPSCERTIFIED PRODUCTS The Common Criteria for Information Technology Security Evaluation (CC), and the companion Common Methodology for Information Technology Security Evaluation (CEM) are the technical basis for an international agreement, the Common Criteria Recognition Arrangement (CCRA), which ensures that: . Products can be evaluated by competent and independent licensed laboratories CERTIFIED PRODUCTS : CC PORTAL Compliance. Scheme. This list was generated on Sunday, May 23, 2021, at 12:28 AM. Access Control Devices and Systems – 26 Certified Products. DriveLock Agent 2019.2 (Device and Application Control) SP 1. Certification Report Security Target. DriveLock SE. CCRACertificate.
ABOUT THE COMMON CRITERIA : CC PORTAL The purpose of this Arrangement is to advance those objectives by bringing about a situation in which IT products and protection profiles which earn a Common Criteria certificate can be procured or used without the need for further evaluation. It seeks to provide grounds for confidence in the reliability of the judgements on whichthe original
COMMON CRITERIA FOR INFORMATION TECHNOLOGY SECURITY EVALUATION Page 2 of 106 Version 3.1 April 2017 Foreword This version of the Common Criteria for Information Technology Security Evaluation (CC v3.1) is the first major revision since being published as GUIDELINES FOR DEVELOPER DOCUMENTATION Guidelines for Developer Documentation according to Common Criteria Version 3.1 . 1 Introduction to this Guidance . This chapter provides an overview about the purpose, the content, and the structure of this SECURE ELEMENT NXP JCOP6.X ON SN200 NXP JCOP6.x on SN200.C04 Secure Element Security Target Lite Rev. 2.1 — 10 September 2020 Product evaluation document NSCIB-CC-235773_2COMPANY PUBLIC
NETWORK COLLABORATIVE PROTECTION PROFILE collaborative Protection Profile for Network Devices v2.2e, 23-March-2020 Page 5 of 174 0.5 Revision History Version Date Description 2.2e 2.2 23-Mar-2020 MOTOROLA NETWORK DEVICES S2500, S6000, GGM 8000 SECURITY Motorola Network Device Security Target 2009-2012 Motorola Solutions® Inc. 1 Motorola Network Devices S2500, S6000, GGM 8000 Security Target EAL 2 augmented ALC_FLR.2 Release Date: June 13, 2012 Document ID:09-1757-R-0057
ADVANTAGES AND DRAWBACKS TO USE CC FOR PRIVATE SCHEMES Advantages and drawbacks to use CC for private schemes Francois GUERIN Security Program Manager francois.guerin@gemalto.com SECURITY TARGET FOR HUAWEI USN9810 V900R012 Security Target for Huawei USN9810 V900R012 Version 1.5 Date 2014-02-17 HUAWEI TECHNOLOGIES CO., LTD. COMMON METHODOLOGY FOR INFORMATION TECHNOLOGY SECURITY Page 2 of 430 Version 3.1 April 2017 Foreword This version of the Common Methodology for Information Technology Security Evaluation (CEM v3.1) is the first major revision since being published as CEM v2.3 in COMMON CRITERIA INFORMATION TECHNOLOGY SECURITY EVALUATION Revision History Revision No. Date Description 0.0 26th October 2016 Creation 1.0 19th May 2017 The table 1 is updated. The chapter 1.2.4, 2.2, 6.1.17, 6.1.19, 6.3.1ST INCARD S.R
Certification Report V1.0 ZS-01-01-F-326 V4.1 BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn FIREEYE VX SERIES APPLIANCES 1 FireEye, Inc. Common Criteria Security Target Prepared By: Acumen Security 18504 Office Park Dr Montgomery Village, MD 20886 www.acumensecurity.netSECURITY TARGET
INTERNAL 7/20 1 Security Target Introduction (ASE_INT.1) 1.1 Security Target Reference ST Title Fort Fox Hardware Data Diode Security Target ST Version 2.06 ST Status Final ST Classification Internal Author Bartek Gedrojc (Fox-IT) Advisor Dirk-Jan Out (Brightsight) Evaluation Assurance Level EAL4+, augmented with AVA_VAN.5 and ALC_DVS.2 Publication Data September 23, 2011 BELKIN SECURE KVM MODELS F1DN102KVM- UN-3, F1DN202KVM … Belkin Secure KVM models F1DN102KVM-UN-3, F1DN202KVM-UN-3, F1DN104KVM-UN-3, F1DN204KVM-UN-3 v33303-C6C6 Security Target Page | 1 Belkin Secure KVM models F1DN102KVM- ASSURANCE CONTINUITY: CCRA REQUIREMENTS Assurance Continuity: CCRA Requirements June 2012 version 2.1 Page 3of 22
MF2DL(H)X0, MF2ID(H)10, NT4H2X21GF AND NT4H2X21TF MF2DL(H)x0, MF2ID(H)10, NT4H2x21Gf and NT4H2x21Tf Security Target Lite Rev. 1.0 – 2018-12-31 Evaluation documentation Final PUBLIC DocumentInformation
RICOH MP C3503/C3003 SECURITY TARGET RICOH MP C3503/C3003 Security Target User EXAMPLE CALCULATION OF ATTACK POTENTIAL V1 =====!"§==Systems= Probing Attack Results • Resistance of the TOE – The TOE is resistant to an attacker with low attack potential (VLA.2) • Required Demonstration of attack to justify the rating COMMON CRITERIA : CC PORTALNEWSICCCPROTECTION PROFILESCOLLABORATIVE PPSCERTIFIED PRODUCTS The Common Criteria for Information Technology Security Evaluation (CC), and the companion Common Methodology for Information Technology Security Evaluation (CEM) are the technical basis for an international agreement, the Common Criteria Recognition Arrangement (CCRA), which ensures that: . Products can be evaluated by competent and independent licensed laboratories COMMON CRITERIA FOR INFORMATION TECHNOLOGY SECURITY EVALUATION Page 2 of 321 Version 3.1 September 2012 Foreword This version of the Common Criteria for Information Technology Security Evaluation (CC v3.1) is the first major revision since being published as NETWORK COLLABORATIVE PROTECTION PROFILE collaborative Protection Profile for Network Devices v2.2e, 23-March-2020 Page 5 of 174 0.5 Revision History Version Date Description 2.2e 2.2 23-Mar-2020 SUPPORTING DOCUMENT GUIDANCE This is a supporting document, intended to complement the Common Criteria and the Common Evaluation Methodology for Information Technology Security Evaluation.ST INCARD S.R
Certification Report V1.0 ZS-01-01-F-326 V4.1 BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn FIREEYE VX SERIES APPLIANCES 1 FireEye, Inc. Common Criteria Security Target Prepared By: Acumen Security 18504 Office Park Dr Montgomery Village, MD 20886 www.acumensecurity.net ADVANTAGES AND DRAWBACKS TO USE CC FOR PRIVATE SCHEMES Advantages and drawbacks to use CC for private schemes Francois GUERIN Security Program Manager francois.guerin@gemalto.com ASSURANCE CONTINUITY: CCRA REQUIREMENTS Assurance Continuity: CCRA Requirements June 2012 version 2.1 Page 3of 22
MOTOROLA NETWORK DEVICES S2500, S6000, GGM 8000 SECURITY Motorola Network Device Security Target 2009-2012 Motorola Solutions® Inc. 1 Motorola Network Devices S2500, S6000, GGM 8000 Security Target EAL 2 augmented ALC_FLR.2 Release Date: June 13, 2012 Document ID:09-1757-R-0057
SECURITY TARGET FOR HUAWEI USN9810 V900R012 Security Target for Huawei USN9810 V900R012 Version 1.5 Date 2014-02-17 HUAWEI TECHNOLOGIES CO., LTD. COMMON CRITERIA : CC PORTALNEWSICCCPROTECTION PROFILESCOLLABORATIVE PPSCERTIFIED PRODUCTS The Common Criteria for Information Technology Security Evaluation (CC), and the companion Common Methodology for Information Technology Security Evaluation (CEM) are the technical basis for an international agreement, the Common Criteria Recognition Arrangement (CCRA), which ensures that: . Products can be evaluated by competent and independent licensed laboratories COMMON CRITERIA FOR INFORMATION TECHNOLOGY SECURITY EVALUATION Page 2 of 321 Version 3.1 September 2012 Foreword This version of the Common Criteria for Information Technology Security Evaluation (CC v3.1) is the first major revision since being published as NETWORK COLLABORATIVE PROTECTION PROFILE collaborative Protection Profile for Network Devices v2.2e, 23-March-2020 Page 5 of 174 0.5 Revision History Version Date Description 2.2e 2.2 23-Mar-2020 SUPPORTING DOCUMENT GUIDANCE This is a supporting document, intended to complement the Common Criteria and the Common Evaluation Methodology for Information Technology Security Evaluation.ST INCARD S.R
Certification Report V1.0 ZS-01-01-F-326 V4.1 BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn FIREEYE VX SERIES APPLIANCES 1 FireEye, Inc. Common Criteria Security Target Prepared By: Acumen Security 18504 Office Park Dr Montgomery Village, MD 20886 www.acumensecurity.net ADVANTAGES AND DRAWBACKS TO USE CC FOR PRIVATE SCHEMES Advantages and drawbacks to use CC for private schemes Francois GUERIN Security Program Manager francois.guerin@gemalto.com ASSURANCE CONTINUITY: CCRA REQUIREMENTS Assurance Continuity: CCRA Requirements June 2012 version 2.1 Page 3of 22
MOTOROLA NETWORK DEVICES S2500, S6000, GGM 8000 SECURITY Motorola Network Device Security Target 2009-2012 Motorola Solutions® Inc. 1 Motorola Network Devices S2500, S6000, GGM 8000 Security Target EAL 2 augmented ALC_FLR.2 Release Date: June 13, 2012 Document ID:09-1757-R-0057
SECURITY TARGET FOR HUAWEI USN9810 V900R012 Security Target for Huawei USN9810 V900R012 Version 1.5 Date 2014-02-17 HUAWEI TECHNOLOGIES CO., LTD. CERTIFIED PRODUCTS : CC PORTAL Compliance. Scheme. This list was generated on Sunday, May 23, 2021, at 12:28 AM. Access Control Devices and Systems – 26 Certified Products. DriveLock Agent 2019.2 (Device and Application Control) SP 1. Certification Report Security Target. DriveLock SE. CCRACertificate.
ABOUT THE COMMON CRITERIA : CC PORTAL The purpose of this Arrangement is to advance those objectives by bringing about a situation in which IT products and protection profiles which earn a Common Criteria certificate can be procured or used without the need for further evaluation. It seeks to provide grounds for confidence in the reliability of the judgements on whichthe original
COMMON CRITERIA FOR INFORMATION TECHNOLOGY SECURITY EVALUATION Page 2 of 106 Version 3.1 April 2017 Foreword This version of the Common Criteria for Information Technology Security Evaluation (CC v3.1) is the first major revision since being published as GUIDELINES FOR DEVELOPER DOCUMENTATION Guidelines for Developer Documentation according to Common Criteria Version 3.1 . 1 Introduction to this Guidance . This chapter provides an overview about the purpose, the content, and the structure of PROTECTION PROFILE CRYPTOGRAPHIC SERVICE PROVIDER Common Criteria Protection Profile Cryptographic Service Provider.BSI-CC-PP-0104-2019
TÜV RHEINLAND NEDERLAND B.V. CERTIFICATION REPORT SN100 Page: 11/15 of report number: NSCIB-CC-174263-CR4, dated 31 May 2021 a l. Table 7 Manuals SN100_SE B2.1 C58 2.6 IT Product Testing Testing (depth, coverage, functional tests, independent testing): The evaluators examined theSECURITY TARGET
INTERNAL 7/20 1 Security Target Introduction (ASE_INT.1) 1.1 Security Target Reference ST Title Fort Fox Hardware Data Diode Security Target ST Version 2.06 ST Status Final ST Classification Internal Author Bartek Gedrojc (Fox-IT) Advisor Dirk-Jan Out (Brightsight) Evaluation Assurance Level EAL4+, augmented with AVA_VAN.5 and ALC_DVS.2 Publication Data September 23, 2011C RT O IS A
Title: C458-M&S21060312490 Created Date: 6/3/2021 12:49:30 PM PROTECTION PROFILE FOR GENERAL PURPOSE OPERATING SYSTEMS Revision History Version Date Comment 4.2.1 2019-04-22 Formatting changes as a result of PP evaluation 4.2 2018-05-22 Multiple TechnicalDecisions applied
SECURITY TARGET RC-SA20, RC-SA21 AND RC-SA24 SERIES Public Version Security Target RC-SA20, RC-SA21 and RC-SA24 Series Page 1 Introduction This document is the Security Target for CC evaluati on of IC chip product "R C-SA20, RC-SA21 and RC-SA24 COMMON CRITERIA : CC PORTALNEWSICCCPROTECTION PROFILESCOLLABORATIVE PPSCERTIFIED PRODUCTS The Common Criteria for Information Technology Security Evaluation (CC), and the companion Common Methodology for Information Technology Security Evaluation (CEM) are the technical basis for an international agreement, the Common Criteria Recognition Arrangement (CCRA), which ensures that: . Products can be evaluated by competent and independent licensed laboratories CERTIFIED PRODUCTS : CC PORTALCOMMON CRITERIACONTACTPROTECTION PROFILESLOGINPUBLICATIONSNEWS Scheme. This list was generated on Sunday, May 23, 2021, at 12:28 AM. Access Control Devices and Systems – 26 Certified Products. DriveLock Agent 2019.2 (Device and Application Control) SP 1. Certification Report Security Target. DriveLock SE. ABOUT THE COMMON CRITERIA : CC PORTAL The purpose of this Arrangement is to advance those objectives by bringing about a situation in which IT products and protection profiles which earn a Common Criteria certificate can be procured or used without the need for further evaluation. It seeks to provide grounds for confidence in the reliability of the judgements on whichthe original
GUIDELINES FOR DEVELOPER DOCUMENTATION Guidelines for Developer Documentation according to Common Criteria Version 3.1 . 1 Introduction to this Guidance . This chapter provides an overview about the purpose, the content, and the structure of this COMMON METHODOLOGY FOR INFORMATION TECHNOLOGY SECURITY Page 2 of 430 Version 3.1 April 2017 Foreword This version of the Common Methodology for Information Technology Security Evaluation (CEM v3.1) is the first major revision sinceST INCARD S.R
Certification Report V1.0 ZS-01-01-F-326 V4.1 BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn US-JP PROTECTION PROFILE FOR HARDCOPY DEVICES V1 Protection Profile for Hardcopy Devices – v1.0 September 10, 2015 Page 1 . Protection Profile for Hardcopy Devices . IPA, NIAP, and the MFP Technical Community ADVANTAGES AND DRAWBACKS TO USE CC FOR PRIVATE SCHEMES Advantages and drawbacks to use CC for private schemes Francois GUERIN Security Program Manager francois.guerin@gemalto.com SECURITY TARGET FOR HUAWEI USN9810 V900R012 Security Target for Huawei USN9810 V900R012 Version 1.5 Date 2014-02-17 HUAWEI TECHNOLOGIES CO., LTD. ASSURANCE CONTINUITY: CCRA REQUIREMENTS Assurance Continuity: CCRA Requirements June 2012 version 2.1 Page 3of 22
COMMON CRITERIA : CC PORTALNEWSICCCPROTECTION PROFILESCOLLABORATIVE PPSCERTIFIED PRODUCTS The Common Criteria for Information Technology Security Evaluation (CC), and the companion Common Methodology for Information Technology Security Evaluation (CEM) are the technical basis for an international agreement, the Common Criteria Recognition Arrangement (CCRA), which ensures that: . Products can be evaluated by competent and independent licensed laboratories CERTIFIED PRODUCTS : CC PORTALCOMMON CRITERIACONTACTPROTECTION PROFILESLOGINPUBLICATIONSNEWS Scheme. This list was generated on Sunday, May 23, 2021, at 12:28 AM. Access Control Devices and Systems – 26 Certified Products. DriveLock Agent 2019.2 (Device and Application Control) SP 1. Certification Report Security Target. DriveLock SE. ABOUT THE COMMON CRITERIA : CC PORTAL The purpose of this Arrangement is to advance those objectives by bringing about a situation in which IT products and protection profiles which earn a Common Criteria certificate can be procured or used without the need for further evaluation. It seeks to provide grounds for confidence in the reliability of the judgements on whichthe original
GUIDELINES FOR DEVELOPER DOCUMENTATION Guidelines for Developer Documentation according to Common Criteria Version 3.1 . 1 Introduction to this Guidance . This chapter provides an overview about the purpose, the content, and the structure of this COMMON METHODOLOGY FOR INFORMATION TECHNOLOGY SECURITY Page 2 of 430 Version 3.1 April 2017 Foreword This version of the Common Methodology for Information Technology Security Evaluation (CEM v3.1) is the first major revision sinceST INCARD S.R
Certification Report V1.0 ZS-01-01-F-326 V4.1 BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn US-JP PROTECTION PROFILE FOR HARDCOPY DEVICES V1 Protection Profile for Hardcopy Devices – v1.0 September 10, 2015 Page 1 . Protection Profile for Hardcopy Devices . IPA, NIAP, and the MFP Technical Community ADVANTAGES AND DRAWBACKS TO USE CC FOR PRIVATE SCHEMES Advantages and drawbacks to use CC for private schemes Francois GUERIN Security Program Manager francois.guerin@gemalto.com SECURITY TARGET FOR HUAWEI USN9810 V900R012 Security Target for Huawei USN9810 V900R012 Version 1.5 Date 2014-02-17 HUAWEI TECHNOLOGIES CO., LTD. ASSURANCE CONTINUITY: CCRA REQUIREMENTS Assurance Continuity: CCRA Requirements June 2012 version 2.1 Page 3of 22
MEMBERS OF THE CCRA : CC PORTAL Scheme Contact Role; Australia: Australasian Certification Authority (ACA) Australasian Information Security Evaluation Program (AISEP) Australian Cyber Security Centre (ACSC) PO CERTIFICATE AUTHORIZING SCHEMES : CC PORTAL Scheme Contact; Australia: Australasian Certification Authority (ACA) Australasian Information Security Evaluation Program (AISEP) Australian Cyber Security Centre COMMON CRITERIA FOR INFORMATION TECHNOLOGY SECURITY EVALUATION Page 2 of 106 Version 3.1 April 2017 Foreword This version of the Common Criteria for Information Technology Security Evaluation (CC v3.1) is the first major revision since being published as NETWORK COLLABORATIVE PROTECTION PROFILE collaborative Protection Profile for Network Devices v2.2e, 23-March-2020 Page 5 of 174 0.5 Revision History Version Date Description 2.2e 2.2 23-Mar-2020 TÜV RHEINLAND NEDERLAND B.V. CERTIFICATION REPORT SN100 Page: 11/15 of report number: NSCIB-CC-174263-CR4, dated 31 May 2021 a l. Table 7 Manuals SN100_SE B2.1 C58 2.6 IT Product Testing Testing (depth, coverage, functional tests, independent testing): The evaluators examined the PROTECTION PROFILE CRYPTOGRAPHIC SERVICE PROVIDER Common Criteria Protection Profile Cryptographic Service Provider.BSI-CC-PP-0104-2019
C RT O IS A
Title: C458-M&S21060312490 Created Date: 6/3/2021 12:49:30 PM SEARCH RESULTS : CC PORTAL Search Results : CC Portal Search ResultsSECURITY TARGET
INTERNAL 7/20 1 Security Target Introduction (ASE_INT.1) 1.1 Security Target Reference ST Title Fort Fox Hardware Data Diode Security Target ST Version 2.06 ST Status Final ST Classification Internal Author Bartek Gedrojc (Fox-IT) Advisor Dirk-Jan Out (Brightsight) Evaluation Assurance Level EAL4+, augmented with AVA_VAN.5 and ALC_DVS.2 Publication Data September 23, 2011 EXAMPLE CALCULATION OF ATTACK POTENTIAL V1 =====!"§==Systems= Probing Attack Results • Resistance of the TOE – The TOE is resistant to an attacker with low attack potential (VLA.2) • Required Demonstration of attack to justify the rating Sitemap | ContactLogin
* NEWS
* ICCC
* PROTECTION PROFILES* COLLABORATIVE PPS
* CERTIFIED PRODUCTS * TECHNICAL COMMUNITIES* PUBLICATIONS
* ABOUT THE CC
* HOME
COMMON CRITERIA
The Common Criteria for Information Technology Security Evaluation (CC), and the companion Common Methodology for Information Technology Security Evaluation (CEM) are the technical basis for an international agreement, the Common Criteria Recognition Arrangement (CCRA), which ensures that: * Products can be evaluated by competent and independent licensed laboratories so as to determine the fulfilment of particular security properties, to a certain extent orassurance;
* Supporting documents , are used within the Common Criteria certification process to define how the criteria and evaluation methods are applied when certifying specific technologies; * The certification of the security properties of an evaluated product can be issued by a number of Certificate Authorizing Schemes , with this certification being based on the result oftheir evaluation;
* These certificates are recognized by all the signatories of the CCRA . The CC is the driving force for the widest available mutual recognition of secure IT products. This web portal is available to support the information on the status of the CCRA, the CC and the certification schemes, licensed laboratories, certified products and related information, news and events. -------------------------NEWS
06 Apr 2021
The Biometrics Security iTC has published the Proposed Draft of the fingerprint presentation attack toolbox for public review08 Jun 2020
The Biometrics Security iTC has published their PP-Module and Supporting Documents v1.0 CERTIFICATE AUTHORIZING MEMBERS CERTIFICATE CONSUMING MEMBERSDetails
Copyright © 2024 ArchiveBay.com. All rights reserved. Terms of Use | Privacy Policy | DMCA | 2021 | Feedback | Advertising | RSS 2.0