Vault 7: Projects

This publication series is about specific projects related to the Vault 7 main publication.

SECRET//20340424
8 (U) Test Report
8.1 (U) Requirements Verification Matrix
(U) The Requirements Verification Matrix below displays six different letter keys to
signify how well the tool meets the user requirement. The meaning of each letter key is
shown adjacent to each letter.
Identifier Meaning
p The tool meets the requirement
I The tool meets the requirement but there is an issue
F The tool fails to meet the requirement
C The tool failed to meet the requirement for a specific configuration
n The requirement could not be tested
T The requirement was tested by other means
Table 8.1.1 (U) Requirements Verification Matrix Letter Keys
Requirement Number
Test Identifier
1 2 3 4 5 6 7 8 9 10 11 12 13
7.1.1 p p p p p p p p
7.2.1 p p p p p p p p p p p
Table 8.1.2 (U) Requirements Verification Matrix for Requirements 1-10
8.2 (U) Findings
(U) None.
8.3 (U) Observations and Comments (Security Characterization)
1. McAfeeall three versions had a single low level alert stating that the installation
modified a registry entry.
2. Norton Internet Security - both versions were non-alerting.
3. Kaspersky –All alerts were low level and were related to the installation.
4. The accessed date and timestamp for the files collected are modified during the
collection process.
(U) Note: For additional information on observation 4, see Appendix A Forensic
Examination Results
SECRET//20340424
8

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh