• Shopping Cart
    There are no items in your cart

ETSI TS 102 165-1 V4.2.3 (2011-03)

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Methods and protocols; Part 1: Method and proforma for Threat, Risk, Vulnerability Analysis

Available format(s)

Hardcopy , PDF

Published date

01-03-2011

Superseded date

13-01-2022

Free

Intellectual Property Rights
Foreword
Modal verbs terminology
Introduction
1 Scope
2 References
3 Definitions, symbols and abbreviations
4 Introduction
5 TVRA method
6 Method process
Annex A (normative) - TVRA proforma
Annex B (informative) - The role of motivation
Annex C - Void
Annex D (informative) - Denial of service attacks
Annex E (informative) - TVRA database structure
Annex F - Void
Annex G (informative) - TVRA Risk Calculation
        Template and Tool
Annex H (informative) - TVRA Countermeasure Cost-Benefit
        Analysis Template and Tool
Annex I (informative) - Bibliography
Annex J (informative) - Change history
History

Specifies a method primarily for use by ETSI standards developers in undertaking an analysis of the threats, risks and vulnerabilities of an Information and Communications Technology (ICT) system.

DocumentType
Technical Specification
Pages
79
PublisherName
European Telecommunications Standards Institute
Status
Superseded
SupersededBy

PD CEN/TR 16968:2016 Electronic Fee Collection. Assessment of security measures for applications using Dedicated Short-Range Communication
ETSI TR 103 456 V1.1.1 (2017-10) CYBER; Implementation of the Network and Information Security (NIS) Directive
ETSI TS 102 165-2 V4.2.1 (2007-02) Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Methods and protocols; Part 2: Protocol Framework Definition; Security Counter Measures
CEN/TR 16968:2016 Electronic Fee Collection - Assessment of security measures for applications using Dedicated Short-Range Communication
S.R. CEN/TR 16968:2016 ELECTRONIC FEE COLLECTION - ASSESSMENT OF SECURITY MEASURES FOR APPLICATIONS USING DEDICATED SHORT-RANGE COMMUNICATION

ETSI TS 102 165-2 V4.2.1 (2007-02) Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Methods and protocols; Part 2: Protocol Framework Definition; Security Counter Measures
ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements
ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
ISO/IEC 27002:2013 Information technology — Security techniques — Code of practice for information security controls
AS/NZS 4360:2004 Risk management
ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model

Access your standards online with a subscription

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

Free