18/30361485 DC : 0
Current
The latest, up-to-date edition.
BS ISO/IEC 19896-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 3: KNOWLEDGE, SKILLS AND EFFECTIVENESS REQUIREMENTS FOR ISO/IEC 15408 EVALUATORS
Hardcopy , PDF
English
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and Definitions
4 Knowledge
5 Skills
6 Experience
7 Education
8 Effectiveness
Annex A (informative) - Technology Types - Knowledge and Skills
Annex B (informative) - Examples of knowledge required for
evaluating security assurance requirement classes
Annex C (informative) - Examples of knowledge required for
evaluating security functional requirement classes
Bibliography
BS ISO/IEC 19896-3.
| Committee |
IST/33/3
|
| DocumentType |
Draft
|
| Pages |
40
|
| PublisherName |
British Standards Institution
|
| Status |
Current
|
| ISO/IEC 19772:2009 | Information technology — Security techniques — Authenticated encryption |
| ISO/IEC 18032:2005 | Information technology — Security techniques — Prime number generation |
| ISO/IEC 27001:2013 | Information technology — Security techniques — Information security management systems — Requirements |
| ISO/IEC TS 24748-6:2016 | Systems and software engineering — Life cycle management — Part 6: System integration engineering |
| ISO/TS 14441:2013 | Health informatics — Security and privacy requirements of EHR systems for use in conformity assessment |
| ISO/IEC 19792:2009 | Information technology — Security techniques — Security evaluation of biometrics |
| ISO 15764:2004 | Road vehicles — Extended data link security |
| ISO/IEC 29164:2011 | Information technology — Biometrics — Embedded BioAPI |
| ISO/TS 17574:2017 | Electronic fee collection — Guidelines for security protection profiles |
| ISO/IEC 27002:2013 | Information technology — Security techniques — Code of practice for information security controls |
| ISO 2427:1974 | Plywood — Veneer plywood with rotary cut veneer for general use — Classification by appearance of panels with outer veneers of beech |
| ISO/IEC 24745:2011 | Information technology — Security techniques — Biometric information protection |
| ISO/TR 14742:2010 | Financial services — Recommendations on cryptographic algorithms and their use |
| ISO/IEC TR 19791:2010 | Information technology — Security techniques — Security assessment of operational systems |
| ISO/IEC TR 20004:2015 | Information technology — Security techniques — Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045 |
| ISO/IEC 29101:2013 | Information technology — Security techniques — Privacy architecture framework |
| ISO/IEC TR 15446:2017 | Information technology — Security techniques — Guidance for the production of protection profiles and security targets |
| ISO/IEC 29128:2011 | Information technology — Security techniques — Verification of cryptographic protocols |
| ISO/IEC TR 18018:2010 | Information technology — Systems and software engineering — Guide for configuration management tool capabilities |
| ISO/IEC TR 30125:2016 | Information technology — Biometrics used with mobile devices |
| ISO/IEC TS 17027:2014 | Conformity assessment — Vocabulary related to competence of persons used for certification of persons |
| ISO/IEC TS 30104:2015 | Information Technology — Security Techniques — Physical Security Attacks, Mitigation Techniques and Security Requirements |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.