19.06.2014 Views

EAL 3 Evaluation of - Common Criteria

EAL 3 Evaluation of - Common Criteria

EAL 3 Evaluation of - Common Criteria

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CCS Certification Report RSA enVision® v4.0 SP 1<br />

15 Acronyms, Abbreviations and Initializations<br />

Acronym/Abbreviation/<br />

Initialization<br />

CCEF<br />

CCS<br />

CPL<br />

DAS<br />

<strong>EAL</strong><br />

ETR<br />

IT<br />

ITSET<br />

NAS<br />

OS<br />

PALCAN<br />

NVD<br />

QA<br />

SFR<br />

SIEM<br />

SQL<br />

ST<br />

TOE<br />

TSF<br />

UI<br />

VAM<br />

16 References<br />

Description<br />

<strong>Common</strong> <strong>Criteria</strong> <strong>Evaluation</strong> Facility<br />

Canadian <strong>Common</strong> <strong>Criteria</strong> <strong>Evaluation</strong> and<br />

Certification Scheme<br />

Certified Products list<br />

Direct Attached Storage<br />

<strong>Evaluation</strong> Assurance Level<br />

<strong>Evaluation</strong> Technical Report<br />

Information Technology<br />

Information Technology Security <strong>Evaluation</strong><br />

and Testing<br />

Network Attached Storage<br />

Operating System<br />

Program for the Accreditation <strong>of</strong> Laboratories<br />

- Canada<br />

National Vulnerability Database (from<br />

Homeland Security)<br />

Quality Assurance<br />

Security Functional Requirement<br />

Security Information Event Management<br />

Structured Query Language<br />

Security Target<br />

Target <strong>of</strong> <strong>Evaluation</strong><br />

TOE Security Function<br />

User Interface<br />

RSA Vulnerability and Asset Management<br />

tool<br />

This section lists all documentation used as source material for this report:<br />

• CCS Publication #4, Technical Oversight, Version 1.1, August 2005.<br />

• <strong>Common</strong> <strong>Criteria</strong> for Information Technology Security <strong>Evaluation</strong>, Version 3.1<br />

Revision 2, September 2007.<br />

• <strong>Common</strong> Methodology for Information Technology Security <strong>Evaluation</strong>, CEM,<br />

Version 3.1 Revision 2, September 2007.<br />

___________________________________________________________________________<br />

Version 1.0 22 January 2010<br />

- Page 10 <strong>of</strong> 11 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!