Cena s DPH / bez DPH
Hlavní stránka>PD CEN ISO/TS 17574:2017 Electronic fee collection. Guidelines for security protection profiles
sklademVydáno: 2017-04-30
PD CEN ISO/TS 17574:2017 Electronic fee collection. Guidelines for security protection profiles

PD CEN ISO/TS 17574:2017

Electronic fee collection. Guidelines for security protection profiles

Formát
Dostupnost
Cena a měna
Anglicky Zabezpečené PDF
K okamžitému stažení
8700 Kč
Čtěte normu po dobu 1 hodiny. Více informací v kategorii E-READING
Čtení normy
na 1 hodinu
870.00 Kč
Čtěte normu po dobu 24 hodin. Více informací v kategorii E-READING
Čtení normy
na 24 hodin
2610.00 Kč
Anglicky Tisk
Skladem
8700 Kč
Označení normy:PD CEN ISO/TS 17574:2017
Počet stran:64
Vydáno:2017-04-30
ISBN:978 0 580 94774 2
Status:Standard
Popis

PD CEN ISO/TS 17574:2017


This standard PD CEN ISO/TS 17574:2017 Electronic fee collection. Guidelines for security protection profiles is classified in these ICS categories:
  • 35.240.60 IT applications in transport and trade
  • 03.220.20 Road transport

This document provides guidelines for preparation and evaluation of security requirements specifications, referred to as Protection Profiles (PP) in ISO/IEC 15408 ( all parts ) and in ISO/IEC TR 15446 .

By Protection Profile (PP), it means a set of security requirements for a category of products or systems that meet specific needs. A typical example would be a PP for On-Board Equipment (OBE) to be used in an EFC system. However, the guidelines in this document are superseded if a Protection Profile already exists for the subsystem in consideration.

The target of evaluation (TOE) for EFC is limited to EFC specific roles and interfaces as shown in Figure 1. Since the existing financial security standards and criteria are applicable to other external roles and interfaces, they are assumed to be outside the scope of TOE for EFC.

Figure 1 Scope of TOE for EFC

image

The security evaluation is performed by assessing the security-related properties of roles, entities and interfaces defined in security targets (STs), as opposed to assessing complete processes which often are distributed over more entities and interfaces than those covered by the TOE of this document.

NOTE Assessing security issues for complete processes is a complimentary approach, which may well be beneficial to apply when evaluating the security of a system.