ETSI TS 102 165-1 V4.2.3 (2011-03)
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Methods and protocols; Part 1: Method and proforma for Threat, Risk, Vulnerability Analysis
Hardcopy , PDF
01-03-2011
13-01-2022
Intellectual Property Rights
Foreword
Modal verbs terminology
Introduction
1 Scope
2 References
3 Definitions, symbols and abbreviations
4 Introduction
5 TVRA method
6 Method process
Annex A (normative) - TVRA proforma
Annex B (informative) - The role of motivation
Annex C - Void
Annex D (informative) - Denial of service attacks
Annex E (informative) - TVRA database structure
Annex F - Void
Annex G (informative) - TVRA Risk Calculation
Template and Tool
Annex H (informative) - TVRA Countermeasure Cost-Benefit
Analysis Template and Tool
Annex I (informative) - Bibliography
Annex J (informative) - Change history
History
Specifies a method primarily for use by ETSI standards developers in undertaking an analysis of the threats, risks and vulnerabilities of an Information and Communications Technology (ICT) system.
| DocumentType |
Technical Specification
|
| Pages |
79
|
| PublisherName |
European Telecommunications Standards Institute
|
| Status |
Superseded
|
| SupersededBy |
| PD CEN/TR 16968:2016 | Electronic Fee Collection. Assessment of security measures for applications using Dedicated Short-Range Communication |
| ETSI TR 103 456 V1.1.1 (2017-10) | CYBER; Implementation of the Network and Information Security (NIS) Directive |
| ETSI TS 102 165-2 V4.2.1 (2007-02) | Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Methods and protocols; Part 2: Protocol Framework Definition; Security Counter Measures |
| CEN/TR 16968:2016 | Electronic Fee Collection - Assessment of security measures for applications using Dedicated Short-Range Communication |
| S.R. CEN/TR 16968:2016 | ELECTRONIC FEE COLLECTION - ASSESSMENT OF SECURITY MEASURES FOR APPLICATIONS USING DEDICATED SHORT-RANGE COMMUNICATION |
| ETSI TS 102 165-2 V4.2.1 (2007-02) | Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Methods and protocols; Part 2: Protocol Framework Definition; Security Counter Measures |
| ISO/IEC 15408-2:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components |
| ISO/IEC 27001:2013 | Information technology — Security techniques — Information security management systems — Requirements |
| ISO/IEC 15408-3:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components |
| ISO/IEC 27002:2013 | Information technology — Security techniques — Code of practice for information security controls |
| AS/NZS 4360:2004 | Risk management |
| ISO/IEC 15408-1:2009 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.