Statements (57)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:psychology
|
gptkbp:developed_by |
gptkb:Common_Criteria_Recognition_Arrangement
|
https://www.w3.org/2000/01/rdf-schema#label |
Common Criteria EAL4+
|
gptkbp:includes |
Vulnerability assessment
Documentation review Testing of the product |
gptkbp:is_applicable_to |
gptkb:virus
gptkb:software gptkb:computer |
gptkbp:is_based_on |
Evaluation criteria
Common Criteria methodology Security evaluation process |
gptkbp:is_considered_as |
Moderate assurance level
|
gptkbp:is_evaluated_by |
gptkb:Certification
Security requirements Security assurance Security functionality Common Criteria requirements |
gptkbp:is_part_of |
gptkb:International_Organization_for_Standardization
gptkb:Cybersecurity gptkb:Common_Criteria Quality assurance process Compliance verification Information assurance Risk assessment framework Evaluation framework Evaluation Assurance Levels Security evaluation framework Common Criteria certification process Security assessment process Security certification process Security certification standards |
gptkbp:is_recognized_by |
gptkb:Australia
gptkb:Canada gptkb:European_Union gptkb:United_States gptkb:ISO/_IEC_15408 International organizations National security agencies |
gptkbp:is_related_to |
EAL3
EAL5 |
gptkbp:is_used_by |
Government agencies
Defense organizations Private sector organizations |
gptkbp:is_used_for |
Risk management
Product certification System certification Component certification |
gptkbp:is_used_in |
IT security products
|
gptkbp:provides |
Assurance of security functionality
|
gptkbp:requires |
Security Target
|
gptkbp:size |
EAL4
EAL5 |
gptkbp:bfsParent |
gptkb:Yubi_Key_4_C
gptkb:Yubi_Key_5_C gptkb:Yubi_Key_5_C_NFC |
gptkbp:bfsLayer |
6
|