ECMA/TR 64 : 1ED 93
Current
The latest, up-to-date edition.
SECURE INFORMATION PROCESSING VERSUS THE CONCEPT OF PRODUCT EVALUATION
12-01-2013
1 Scope
2 References
3 Acronyms and abbreviations
4 Introduction
5 Approaching Security: System perspective, Balance,
Feedback
5.1 System perspective
5.2 Balance
5.3 Feedback
6 Security Evaluations: the Practice
7 The Value of Formal Evaluations in the Commercial
Market
8 Conclusions
Annex A - The Concept of Security Evaluations - A
Tutorial
A.1 Introduction
A.2 Availability, Integrity, Confidentiality
A.3 Security Target
A.4 Protection Profile
A.5 Functional Criteria
A.6 Assurance Criteria
A.7 Predefined Functionality Classes
A.8 The Evolution of Security Evaluation Criteria
A.9 Evaluation and Certification
A.10 Harmonization of Criteria
Specifies the potential benefit specific to evaluations and makes recommendations as to the processes for creating an IT security program with special emphasis on security evaluations.
DocumentType |
Technical Report
|
PublisherName |
European Computer Manufacturers Association
|
Status |
Current
|
ECMA 205 : 1ED 93 | COMMERCIALLY ORIENTED FUNCTIONALITY CLASS FOR SECURITY EVALUATION (COFC) |
ECMA/TR 46 : 1ED 88 | SECURITY IN OPEN SYSTEMS - A SECURITY FRAMEWORK |
ECMA 138 : 1989 | SECURITY IN OPEN SYSTEMS - DATA ELEMENTS AND SERVICE DEFINITIONS |
ECMA 205 : 1ED 93 | COMMERCIALLY ORIENTED FUNCTIONALITY CLASS FOR SECURITY EVALUATION (COFC) |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.