Research Article
Security Evaluation Framework for Military IoT Devices
Table 7
Comparison with other approaches.
| | Our framework | RMF | Cybersecurity T&E | CC based approaches |
| Purpose | Integrated into arms import process | Integrated into acquisition system | Eliminate vulnerabilities | Security evaluation of information products |
| For international use | ○ | △ | X | ○ |
| Functional test | ○ | ○ | ○ | ○ |
| Operational test | ○ | ○ | ○ | X |
| Risk management | ○ | ○ | X | X |
|
|