McAfee HARDWARE 1.4 Installation Guide Page 4

  • Download
  • Add to my manuals
  • Print
  • Page
    / 61
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 3
McAfee Email Gateway
Security Target
McAfee Incorporated
Page 4 of 61
Table 5 - Physical Scope and Boundary: Software .....................................................................................16
Table 6 - Assumptions .................................................................................................................................21
Table 7 - Threats .........................................................................................................................................22
Table 8 - Organisational security policy.......................................................................................................22
Table 9 - Security objectives for the TOE ....................................................................................................23
Table 10 - Security objectives for the environment .....................................................................................24
Table 11 - Security Problem & IT Security Objectives Mappings ................................................................25
Table 12 - TOE Security Functional Requirements .....................................................................................28
Table 13 - TOE Security Functional Requirements and Auditable Events ..................................................42
Table 14 - Assurance Requirements ...........................................................................................................49
Table 15 - Security objective mapping rationale .........................................................................................50
Table 16 - SFR dependencies .....................................................................................................................52
Table 17 CAVP Algorithm Certificates......................................................................................................59
Table 18 - SFR to Security Functions mapping ...........................................................................................61
Page view 3
1 2 3 4 5 6 7 8 9 ... 60 61

Comments to this Manuals

No comments