Security Evaluation Methodologies
The course discusses security evaluation of information systems, security evaluation of software, security evaluation of products, security code inspection, security testing, security standards, preparation of a security evaluation: impact scale, likelihood scale, severity scale, vulnerability analysis, risk analysis, security plan elaboration, common criteria, target of evaluation, protection profile, security functional requirement, security factors, errors, accidents, assurance requirements, assurance levels, evaluation process, compliance with the protection profile, and security evaluation case studies.