HOW to help the end-users to identify and analyze the attacks in cyberspace has been extremely important to the information security task . Based on the standards of the Security Audit and Alarms F rameW0rk published by 150 , we intended to investigate the Security Function and Security Assurance Re 勾 u irements of 50-called Informationw Wrapper Products . Besides , in the paper we also proposed the P rotection Profile of Information Wrapper as the security specification for developing relevant products