• TR 187 011 : 2.1.1

    Current The latest, up-to-date edition.

    TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; APPLICATION OF ISO-15408-2 REQUIREMENTS TO ETSI STANDARDS - GUIDE, METHOD AND APPLICATION WITH EXAMPLES

    Available format(s):  Hardcopy, PDF

    Language(s):  English

    Published date: 

    Publisher:  European Telecommunications Standards Institute

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Intellectual Property Rights
    Foreword
    1 Scope
    2 References
      2.1 Normative references
      2.2 Informative references
    3 Definitions and abbreviations
      3.1 Definitions
      3.2 Abbreviations
    4 Standards, assets and systems
    5 Objectives and requirements in security standards
      5.1 Overview
      5.2 Security objectives
      5.3 Security requirements
    6 Threat Analysis
    7 Specifying security objectives
      7.1 Getting started
      7.2 Identifying security objectives
      7.3 Formulating security objectives
      7.4 Validating security objectives
    8 Requirements capture
      8.1 The characteristics of requirements
      8.2 Specifying requirements
    9 Specifying security objectives and requirements
      using ISO/IEC 15408-2
      9.1 Overview
      9.2 Characterizing functional components
      9.3 Identifying ISO/IEC 15408-2 component elements
          in standards
      9.4 Integration with TVRA
    Annex A: Worked examples of using the method in NGN
             applications
          A.1 RACS
          A.2 Unsolicited communication
          A.3 Media security
          A.4 IPTV
    History

    Abstract - (Show below) - (Hide below)

    Specifies a method, based on the application of ISO/IEC 15408-2, for concisely and unambiguously declaring security requirements expressed in ETSI standards.

    General Product Information - (Show below) - (Hide below)

    Committee TISPAN 07
    Document Type Standard
    Publisher European Telecommunications Standards Institute
    Status Current

    Standards Referenced By This Book - (Show below) - (Hide below)

    TR 102 764 : 1.1.1 EHEALTH; ARCHITECTURE; ANALYSIS OF USER SERVICE MODELS, TECHNOLOGIES AND APPLICATIONS SUPPORTING EHEALTH
    TR 102 780 : 1.1.1 METHODS FOR TESTING AND SPECIFICATION (MTS); SECURITY; GUIDE TO THE USE OF METHODS IN DEVELOPMENT OF ETSI SECURITY STANDARDS
    TR 187 020 : 1.1.1 RADIO FREQUENCY IDENTIFICATION (RFID); COORDINATED ESO RESPONSE TO PHASE 1 OF EU MANDATE M436
    GS NFV-SEC 006 : 1.1.1 NETWORK FUNCTIONS VIRTUALISATION (NFV); SECURITY GUIDE; REPORT ON SECURITY ASPECTS AND REGULATORY CONCERNS
    TS 187 001 : 3.9.1 NETWORK TECHNOLOGIES (NTECH); NGN SECURITY (SEC); REQUIREMENTS
    TS 102 165-1 : 4.2.3 CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA)
    TR 187 002 : 3.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); TISPAN NGN SECURITY (NGN SEC); THREAT, VULNERABILITY AND RISK ANALYSIS
    TR 187 009 : 2.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); FEASIBILITY STUDY OF PREVENTION OF UNSOLICITED COMMUNICATION IN THE NGN
    TS 102 747 : 1.1.1 HUMAN FACTORS (HF); PERSONALIZATION AND USER PROFILE MANAGEMENT; ARCHITECTURAL FRAMEWORK
    TR 187 014 : 2.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); ESECURITY; USER GUIDE TO ETVRA WEB-DATABASE
    TR 103 087 : 1.2.1 RECONFIGURABLE RADIO SYSTEMS (RRS); SECURITY RELATED USE CASES AND THREATS

    Standards Referencing This Book - (Show below) - (Hide below)

    EG 201 383 : 1.1.1 METHODS FOR TESTING AND SPECIFICATION (MTS) - USE OF SDL IN ETSI DELIVERABLES - GUIDELINES FOR FACILITATING VALIDATION AND THE DEVELOPMENT OF CONFORMANCE TESTS
    ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
    ES 202 382 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING PROTECTION PROFILES
    ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
    TS 102 165-1 : 4.2.3 CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA)
    EG 202 106 : 2.1.1 METHODS FOR TESTING AND SPECIFICATION (MTS); GUIDELINES FOR THE USE OF FORMAL SDL AS A DESCRIPTIVE TOOL
    EG 201 872 : 1.2.1 METHODS FOR TESTING AND SPECIFICATIONS; METHODOLOGICAL APPROACH TO THE USE OF OBJECT-ORIENTATION DESIGN IN THE STANDARDS MAKING PROCESS
    ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
    TR 102 420 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); REVIEW OF ACTIVITY ON SECURITY
    EG 202 387 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD FOR APPLICATION OF COMMON CRITERIA TO ETSI DELIVERABLES
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective