Menu
0
Total price
0 €
PRICES include / exclude VAT
Homepage>PD ISO/IEC TR 15443-3:2007 Information technology. Security techniques. A framework for IT security assurance Analysis of assurance methods
sklademVydáno: 2008-01-31
PD ISO/IEC TR 15443-3:2007 Information technology. Security techniques. A framework for IT security assurance Analysis of assurance methods

PD ISO/IEC TR 15443-3:2007

Information technology. Security techniques. A framework for IT security assurance Analysis of assurance methods

Format
Availability
Price and currency
Anglicky Secure PDF
Immediate download
373.29 €
You can read the standard for 1 hour. More information in the category: E-reading
Reading the standard
for 1 hour
37.33 €
You can read the standard for 24 hours. More information in the category: E-reading
Reading the standard
for 24 hours
111.99 €
Anglicky Hardcopy
In stock
373.29 €
Označení normy:PD ISO/IEC TR 15443-3:2007
Počet stran:72
Vydáno:2008-01-31
ISBN:978 0 580 53232 0
Status:Standard
DESCRIPTION

PD ISO/IEC TR 15443-3:2007


This standard PD ISO/IEC TR 15443-3:2007 Information technology. Security techniques. A framework for IT security assurance is classified in these ICS categories:
  • 35.030 IT Security

1.1 Purpose

The purpose of this part of ISO/IEC TR 15443 is to provide general guidance to an assurance authority in the choice of the appropriate type of international communications techology (ICT) assurance methods and to lay the framework for the analysis of specific assurance methods for specific environments.

1.2 Application

This part of ISO/IEC TR 15443 will allow the user to match specific assurance requirements and/or typical assurance situations with the general characteristics offered by available assurance methods.

1.3 Field of Application

The guidance of this part of ISO/IEC TR 15443 is applicable to the development, implementation and operation of ICT products and ICT systems with security requirements.

1.4 Limitations

Security requirements may be complex, assurance methods are of great diversity, and organisational resources and cultures differ considerably.

Therefore the advice given in this part of ISO/IEC TR 15443 will be qualitative and summary, and the user may need to analyse on his own which methods presented in Part 2 of this Technical Report will suit best his specific deliverables and organisational security requirements.