Menu
0
Total price
0 €
PRICES include / exclude VAT
Homepage>BS EN ISO/IEC 19790:2020 Information technology. Security techniques. Security requirements for cryptographic modules
sklademVydáno: 2020-12-22
BS EN ISO/IEC 19790:2020 Information technology. Security techniques. Security requirements for cryptographic modules

BS EN ISO/IEC 19790:2020

Information technology. Security techniques. Security requirements for cryptographic modules

Format
Availability
Price and currency
Anglicky Secure PDF
Immediate download
373.29 €
You can read the standard for 1 hour. More information in the category: E-reading
Reading the standard
for 1 hour
37.33 €
You can read the standard for 24 hours. More information in the category: E-reading
Reading the standard
for 24 hours
111.99 €
Anglicky Hardcopy
In stock
373.29 €
Označení normy:BS EN ISO/IEC 19790:2020
Počet stran:84
Vydáno:2020-12-22
ISBN:978 0 539 16461 9
Status:Standard
DESCRIPTION

BS EN ISO/IEC 19790:2020


This standard BS EN ISO/IEC 19790:2020 Information technology. Security techniques. Security requirements for cryptographic modules is classified in these ICS categories:
  • 35.030 IT Security

This International Standard specifies the security requirements for a cryptographic module utilised within a security system protecting sensitive information in computer and telecommunication systems. This International Standard defines four security levels for cryptographic modules to provide for a wide spectrum of data sensitivity (e.g. low value administrative data, million dollar funds transfers, life protecting data, personal identity information, and sensitive information used by government) and a diversity of application environments (e.g. a guarded facility, an office, removable media, and a completely unprotected location). This International Standard specifies four security levels for each of 11 requirement areas with each security level increasing security over the preceding level.

This International Standard specifies security requirements specified intended to maintain the security provided by a cryptographic module and compliance to this International Standard is not sufficient to ensure that a particular module is secure or that the security provided by the module is sufficient and acceptable to the owner of the information that is being protected.