Cena s DPH / bez DPH
Hlavní stránka>PD ISO/IEC TR 15443-3:2007 Information technology. Security techniques. A framework for IT security assurance Analysis of assurance methods
sklademVydáno: 2008-01-31
PD ISO/IEC TR 15443-3:2007 Information technology. Security techniques. A framework for IT security assurance Analysis of assurance methods

PD ISO/IEC TR 15443-3:2007

Information technology. Security techniques. A framework for IT security assurance Analysis of assurance methods

Formát
Dostupnost
Cena a měna
Anglicky Zabezpečené PDF
K okamžitému stažení
9420 Kč
Čtěte normu po dobu 1 hodiny. Více informací v kategorii E-READING
Čtení normy
na 1 hodinu
942.00 Kč
Čtěte normu po dobu 24 hodin. Více informací v kategorii E-READING
Čtení normy
na 24 hodin
2826.00 Kč
Anglicky Tisk
Skladem
9420 Kč
Označení normy:PD ISO/IEC TR 15443-3:2007
Počet stran:72
Vydáno:2008-01-31
ISBN:978 0 580 53232 0
Status:Standard
Popis

PD ISO/IEC TR 15443-3:2007


This standard PD ISO/IEC TR 15443-3:2007 Information technology. Security techniques. A framework for IT security assurance is classified in these ICS categories:
  • 35.030 IT Security

1.1 Purpose

The purpose of this part of ISO/IEC TR 15443 is to provide general guidance to an assurance authority in the choice of the appropriate type of international communications techology (ICT) assurance methods and to lay the framework for the analysis of specific assurance methods for specific environments.

1.2 Application

This part of ISO/IEC TR 15443 will allow the user to match specific assurance requirements and/or typical assurance situations with the general characteristics offered by available assurance methods.

1.3 Field of Application

The guidance of this part of ISO/IEC TR 15443 is applicable to the development, implementation and operation of ICT products and ICT systems with security requirements.

1.4 Limitations

Security requirements may be complex, assurance methods are of great diversity, and organisational resources and cultures differ considerably.

Therefore the advice given in this part of ISO/IEC TR 15443 will be qualitative and summary, and the user may need to analyse on his own which methods presented in Part 2 of this Technical Report will suit best his specific deliverables and organisational security requirements.