• I.S. EN 419251-1:2013

    Current The latest, up-to-date edition.

    SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY

    Available format(s):  Hardcopy, PDF

    Language(s):  English

    Published date:  01-01-2013

    Publisher:  National Standards Authority of Ireland

    For Harmonized Standards, check the EU site to confirm that the Standard is cited in the Official Journal.
    Only cited Standards give presumption of conformance to New Approach Directives/Regulations.

    Dates of withdrawal of national standards are available from NSAI.

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    1 Scope
    2 Normative references
    3 Conformance
    4 Terms and definitions
    5 Symbols and abbreviations
    6 Overview of the target of evaluation
    7 TOE Environment
    8 Life Cycle
    9 Security problem definition
    10 Security objectives
    11 Extended component definition
    12 Security requirements
    Bibliography
    Index

    Abstract - (Show below) - (Hide below)

    Specifies the security requirements for an authentication device.

    General Product Information - (Show below) - (Hide below)

    Document Type Standard
    Publisher National Standards Authority of Ireland
    Status Current

    Standards Referencing This Book - (Show below) - (Hide below)

    EN 419251-2:2013 Security requirements for device for authentication - Part 2: Protection profile for extension for trusted channel to certificate generation application
    EN 419251-3:2013 Security requirements for device for authentication - Part 3: Additional functionality for security targets
    ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
    PREN 14169-3 : DRAFT 2010 PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 3: DEVICE WITH KEY IMPORT
    ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
    PREN 14169-5 : DRAFT 2010 PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 5: DEVICE WITH KEY GENERATION AND TRUSTED COMMUNICATION WITH SIGNATURE-CREATION APPLICATION
    PREN 14169-2 : DRAFT 2010 PROTECTION PROFILE FOR SECURE SIGNATURE CREATION DEVICE - PART 2: DEVICE WITH KEY GENERATION
    PREN 14169-6 : DRAFT 2010 PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 6: DEVICE WITH KEY IMPORT AND TRUSTED COMMUNICATION WITH SIGNATURE-CREATION APPLICATION
    ISO/IEC 10181-2:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework
    PREN 14169-4 : DRAFT 2010 PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 4: EXTENSION FOR DEVICE WITH KEY GENERATION AND TRUSTED COMMUNICATION WITH CERTIFICATE GENERATION APPLICATION
    ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
    ISO/IEC 18045:2008 Information technology — Security techniques — Methodology for IT security evaluation
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective