18/30361485 DC : 0
Current
The latest, up-to-date edition.
BS ISO/IEC 19896-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 3: KNOWLEDGE, SKILLS AND EFFECTIVENESS REQUIREMENTS FOR ISO/IEC 15408 EVALUATORS
Hardcopy , PDF
English
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and Definitions
4 Knowledge
5 Skills
6 Experience
7 Education
8 Effectiveness
Annex A (informative) - Technology Types - Knowledge and Skills
Annex B (informative) - Examples of knowledge required for
evaluating security assurance requirement classes
Annex C (informative) - Examples of knowledge required for
evaluating security functional requirement classes
Bibliography
BS ISO/IEC 19896-3.
Committee |
IST/33/3
|
DocumentType |
Draft
|
Pages |
40
|
PublisherName |
British Standards Institution
|
Status |
Current
|
ISO/IEC 19772:2009 | Information technology Security techniques Authenticated encryption |
ISO/IEC 18032:2005 | Information technology Security techniques Prime number generation |
ISO/IEC 27001:2013 | Information technology — Security techniques — Information security management systems — Requirements |
ISO/IEC TS 24748-6:2016 | Systems and software engineering — Life cycle management — Part 6: System integration engineering |
ISO/TS 14441:2013 | Health informatics — Security and privacy requirements of EHR systems for use in conformity assessment |
ISO/IEC 19792:2009 | Information technology Security techniques Security evaluation of biometrics |
ISO 15764:2004 | Road vehicles Extended data link security |
ISO/IEC 29164:2011 | Information technology — Biometrics — Embedded BioAPI |
ISO/TS 17574:2017 | Electronic fee collection — Guidelines for security protection profiles |
ISO/IEC 27002:2013 | Information technology Security techniques Code of practice for information security controls |
ISO 2427:1974 | Plywood Veneer plywood with rotary cut veneer for general use Classification by appearance of panels with outer veneers of beech |
ISO/IEC 24745:2011 | Information technology Security techniques Biometric information protection |
ISO/TR 14742:2010 | Financial services Recommendations on cryptographic algorithms and their use |
ISO/IEC TR 19791:2010 | Information technology Security techniques Security assessment of operational systems |
ISO/IEC TR 20004:2015 | Information technology Security techniques Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045 |
ISO/IEC 29101:2013 | Information technology Security techniques Privacy architecture framework |
ISO/IEC TR 15446:2017 | Information technology Security techniques Guidance for the production of protection profiles and security targets |
ISO/IEC 29128:2011 | Information technology — Security techniques — Verification of cryptographic protocols |
ISO/IEC TR 18018:2010 | Information technology Systems and software engineering Guide for configuration management tool capabilities |
ISO/IEC TR 30125:2016 | Information technology Biometrics used with mobile devices |
ISO/IEC TS 17027:2014 | Conformity assessment — Vocabulary related to competence of persons used for certification of persons |
ISO/IEC TS 30104:2015 | Information Technology Security Techniques Physical Security Attacks, Mitigation Techniques and Security Requirements |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.