1. Does the rapid development of computer technology put any strain on the existing criteria for updates?
2. Study and compare TCSEC, ITSEC, and CC assurance levels.
3. Trace the evolution of the security evaluation criteria.
4. Discuss how standards in fluence the security evaluation criteria.