category 1
Category 2
Category 3
Category 4
Category 5
100

Validates security controls NOT through a third party.

Certification

100

Used for authentication in Windows.

Kerberos

100

Involves a third party testing service and compiles results that may be trusted by many organizations.

Verification

100

Act of managemeny formally acception an evaluation system.

Accreditation

100

Scans outbound traffic for potential security issues.

Egree Filtering

200

Runs within the virtualization platform and serves as the moderator between virtual resources and physical resources.

Hypervisor

200

Sets up access controls that change dynamically based on users' previous actions.

Brewer-Nash

200

Protects data integrity and reviews transactions within an application.

Clark-Wilson

200

Most common VPN protocols.

PPTP, L2F, L2TP. IPsec

200

Focuses on protecting integrity and reviewing change by subjects.

Biba Model

300

Proves someone has authenticated services in Kerberos.

Ticket Granting Tickets (TGT)

300

Summarize large amounts of data.

Aggregate Functions

300

Evaluates based on information available.

Inference

300

Uses two disks containing identical information.

RAID Level 1

300

Removes data from a system or device and is more extensive.

Sanitation

400

Strong symmetric cipher that is appropiate for use with data at rest.

AES

400

Separates the control plane from the data plane, so network devices do not have to run complext logic.

Software Defined Networking (SDN)

400

Allows developers to test code in a virtual environment isolated from production.

Sandboxing

400

The platform is often server based and the servers are maintained and managed by the vendor, but the customer has control over and responsibility for applications that may run on the server and other devices.

Platform as as Service (PaaS)

400

Typically used for data at rest.

Symmetric Encryption (Ex: AES)

500

Port 21

FTP

500

Port 23

Telnet

500

Port 22

SSH

500

Port 25

SMTP

500

Port 110

POP3