 |
 |
 |
 |
 |
 |
 |
 |
 |
|
|
 |
Example - Rationale
|
|
|
Sample Completeness
|
|
|
|
|
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
¨ |
Build
on dependency analysis
|
|
|
¨ |
Show
defence against bypassing &
|
|
|
|
tampering
|
|
|
|
– |
tabular
form
|
|
|
|
– |
supported
by explanation of general principles,
|
|
|
e.g.
|
|
|
|
– |
Tampering
attacks are prevented by .....
|
|
|
|
|
|
 |
600.436 High-
|
|
|
Assurance
Systems
|
|
|
|
|
Fall
01/Protection Profiles
|
|
|
|
|
|
|
|
|