DIN EN 419251-3:2013-06
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS |
BS EN 419251-2:2013
|
Security requirements for device for authentication Protection profile for extension for trusted channel to certificate generation application |
BS ISO/IEC 19896-1:2018
|
IT security techniques. Competence requirements for information security testers and evaluators Introduction, concepts and general requirements |
ISO/IEC TR 20004:2015
|
Information technology Security techniques Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045 |
BS EN 50436-6:2015
|
Alcohol interlocks. Test methods and performance requirements Data security |
ISO/IEC TS 19249:2017
|
Information technology — Security techniques — Catalogue of architectural and design principles for secure products, systems and applications |
BS ISO/IEC 30107-3:2017
|
Information technology. Biometric presentation attack detection Testing and reporting |
BS ISO/IEC 15408-1:2009
|
Information technology. Security techniques. Evaluation criteria for IT security Introduction and general model |
DIN EN 419251-1 E : 2013
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY |
CSA TELECOM ORGANIZATIONS PACKAGE : 2018
|
CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR |
PD ISO/IEC TR 15443-1:2012
|
Information technology. Security techniques. Security assurance framework Introduction and concepts |
I.S. EN 50436-6:2015
|
ALCOHOL INTERLOCKS - TEST METHODS AND PERFORMANCE REQUIREMENTS - PART 6: DATA SECURITY |
EN 50436-6:2015
|
Alcohol interlocks - Test methods and performance requirements - Part 6: Data security |
16/30329605 DC : 0
|
BS ISO/IEC 30107-3 - INFORMATION TECHNOLOGY - BIOMETRIC PRESENTATION ATTACK DETECTION - PART 3: TESTING AND REPORTING |
ISO/IEC 30107-3:2017
|
Information technology — Biometric presentation attack detection — Part 3: Testing and reporting |
15/30279952 DC : 0
|
BS ISO/IEC 30124 - CODE OF PRACTICE FOR THE IMPLEMENTATION OF A BIOMETRIC SYSTEM |
BS EN 419251-1:2013
|
Security requirements for device for authentication Protection profile for core functionality |
08/30133461 DC : 0
|
ISO/IEC 27003 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
13/30277648 DC : 0
|
BS EN 50436-6 - ALCOHOL INTERLOCKS - TEST METHODS AND PERFORMANCE REQUIREMENTS - PART 6: DATA SECURITY |
ISO/IEC TR 15446:2017
|
Information technology Security techniques Guidance for the production of protection profiles and security targets |
BS ISO/IEC 18367:2016
|
Information technology. Security techniques. Cryptographic algorithms and security mechanisms conformance testing |
CSA ISO/IEC 15408-1 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
CSA ISO/IEC TR 15446 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDE FOR THE PRODUCTION OF PROTECTION PROFILES AND SECURITY TARGETS |
INCITS/ISO/IEC 15408-1 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
ISO/IEC TS 20540:2018
|
Information technology — Security techniques — Testing cryptographic modules in their operational environment |
UNE-ISO/IEC TR 19791:2013 IN
|
Information technology. Security techniques. Security assessment of operational systems |
UNE 71512:2011
|
Applications with the Spanish DNIe. Electronic signature creation and verification. Type 2 for personal computers, and with a Evaluation Assurance Level «EAL1» |
BIS IS 14990-1 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
CAN/CSA-ISO/IEC 18367:18
|
Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing (Adopted ISO/IEC 18367:2016, first edition, 2016-12-15) |
UNE 71511:2011
|
Applications with the Spanish DNIe. Electronic signature creation and verification. Type 1 for IT platforms that allow an exclusive control of signer’s interfaces, and with a Evaluation Assurance Level «EAL3» |
ISO/IEC 18367:2016
|
Information technology Security techniques Cryptographic algorithms and security mechanisms conformance testing |
UNE 71513:2011
|
Applications with the Spanish DNIe. Electronic signature creation and verification. Type 2 for personal computers, and with a Evaluation Assurance Level «EAL3» |
UNE-ISO/IEC TR 15446:2013 IN
|
Information technology. Security techniques. Guide for the production of Protection Profiles and Security Targets |
DIN EN 419251-2:2013-06
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION |
PD ISO/IEC TR 15443-3:2007
|
Information technology. Security techniques. A framework for IT security assurance Analysis of assurance methods |
PD ISO/IEC TS 30104:2015
|
Information Technology. Security Techniques. Physical Security Attacks, Mitigation Techniques and Security Requirements |
DIN EN 419251-3 E : 2013
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS |
DIN EN 419251-1:2013-05
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY |
ISO/IEC TR 19791:2010
|
Information technology Security techniques Security assessment of operational systems |
ISO/IEC TR 15443-3:2007
|
Information technology Security techniques A framework for IT security assurance Part 3: Analysis of assurance methods |
OLF 112-2 : 2013
|
DEPLOYMENT OF RADIO FREQUENCY IDENTIFICATION (RFID) IN THE OIL AND GAS INDUSTRY - PART 2: ARCHITECTURE AND INTEGRATION |
PD ISO/IEC TR 20004:2015
|
Information technology. Security techniques. Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045 |
BS EN 419251-3:2013
|
Security requirements for device for authentication Additional functionality for security targets |
ISO/IEC 15408-1:2009
|
Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
I.S. EN 419251-2:2013
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION |
CSA ISO/IEC 27003 : 2010 : R2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
ISO/IEC TR 15443-1:2012
|
Information technology Security techniques Security assurance framework Part 1: Introduction and concepts |
UNE 71510:2011
|
Applications with the Spanish DNIe. Electronic signature creation and verification. Type 1 for IT platforms that allow an exclusive control of signer’s interfaces, and with a Evaluation Assurance Level «EAL1». |
03/652496 DC : DRAFT JUNE 2003
|
ISO/IEC TR 15443-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - A FRAMEWORK FOR IT SECURITY ASSURANCE - PART 1: OVERVIEW AND FRAMEWORK |
PD ISO/IEC TR 15446:2009
|
Information technology. Security techniques. Guide for the production of protection profiles and security targets |
CSA INFORMATION SECURITY PACKAGE : 2018
|
CONSISTS OF CAN/CSA-ISO/IEC 27000:18 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - OVERVIEW AND VOCABULARY; CAN/CSA-ISO/IEC 27001:14, INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEMS - REQUIREMENTS; CAN/CSA-ISO/IEC 27002:15 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION |
UNI EN 419251-3 : 2013
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS |
15/30279582 DC : 0
|
BS ISO/IEC 18367 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC ALGORITHMS AND SECURITY MECHANISMS CONFORMANCE TESTING |
UNI EN 419251-1 : 2013
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY |
PD ISO/IEC/TR 19249:2017
|
Information technology. Security techniques Catalogue of architectural and design principles for secure products, systems and applications |
CSA ISO/IEC 15408-1 : 2010 : R2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1: INTRODUCTION AND GENERAL MODEL |
CSA ISO/IEC TR 15446 : 2010 : R2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDE FOR THE PRODUCTION OF PROTECTION PROFILES AND SECURITY TARGETS |
CSA ISO/IEC 27003 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - INFORMATION SECURITY MANAGEMENT SYSTEM IMPLEMENTATION GUIDANCE |
CSA ISO/IEC TR 15443-1 : 2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SECURITY ASSURANCE FRAMEWORK - PART 1: INTRODUCTION AND CONCEPTS |
ISO/IEC TS 30104:2015
|
Information Technology Security Techniques Physical Security Attacks, Mitigation Techniques and Security Requirements |
EN 419251-2:2013
|
Security requirements for device for authentication - Part 2: Protection profile for extension for trusted channel to certificate generation application |
EN 419251-3:2013
|
Security requirements for device for authentication - Part 3: Additional functionality for security targets |
EN 419251-1:2013
|
Security requirements for device for authentication - Part 1: Protection profile for core functionality |
PREN 50436-6 : DRAFT 2013
|
ALCOHOL INTERLOCKS - TEST METHODS AND PERFORMANCE REQUIREMENTS - PART 6: DATA SECURITY |
17/30351732 DC : 0
|
BS ISO/IEC 19896-1 - INFORMATION TECHNOLOGY - IT SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 1: INTRODUCTION, CONCEPTS AND GENERAL REQUIREMENTS |
07/30167505 DC : 0
|
BS ISO/IEC 15408-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - EVALUATION CRITERIA FOR IT SECURITY - PART 1 - INTRODUCTION AND GENERAL MODEL |
DIN EN 419251-2 E : 2013
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION |
UNI EN 419251-2 : 2013
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 2: PROTECTION PROFILE FOR EXTENSION FOR TRUSTED CHANNEL TO CERTIFICATE GENERATION APPLICATION |
ISO/IEC 19896-1:2018
|
IT security techniques — Competence requirements for information security testers and evaluators — Part 1: Introduction, concepts and general requirements |
I.S. EN 419251-3:2013
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS |
I.S. EN 419251-1:2013
|
SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 1: PROTECTION PROFILE FOR CORE FUNCTIONALITY |