• Shopping Cart
    There are no items in your cart

TR 102 780 : 1.1.1

Current

Current

The latest, up-to-date edition.

METHODS FOR TESTING AND SPECIFICATION (MTS); SECURITY; GUIDE TO THE USE OF METHODS IN DEVELOPMENT OF ETSI SECURITY STANDARDS

Available format(s)

Hardcopy , PDF

Language(s)

English

€17.53
Excluding VAT

Intellectual Property Rights
Foreword
1 Scope
2 References
  2.1 Normative references
  2.2 Informative references
3 Definitions, symbols and abbreviations
  3.1 Definitions
  3.2 Abbreviations
4 Security design guidelines
  4.1 Introduction
  4.2 Standards and requirements
  4.3 Communications security
  4.4 Primary security technologies
  4.5 Secondary security attributes
  4.6 Security associations
5 Risk analysis
  5.1 Attacks and attack vectors
6 Security boundary analysis and establishment
7 Countermeasure patterns and specialization
8 Cryptographic selection and design
  8.1 Specification of algorithms and other cryptographic
      processes
  8.2 Attacks on cryptographic implementations
9 Security testing
  9.1 Protocol testing
  9.2 Penetration testing
Annex A: Review of US Standards Development Organizations
         relating to ICT Security Requirements
      A.1 ANSI
      A.2 IEEE
      A.3 NIST
      A.4 TIA
      A.5 IETF
History

Describes existing process documents and illustrates their use in order to provide a unified method for the preparation of security documents (guides, standards, algorithms).

Committee
MTS
DocumentType
Standard
Pages
24
PublisherName
European Telecommunications Standards Institute
Status
Current

TS 133 203 : 13.1.0 DIGITAL CELLULAR TELECOMMUNICATIONS SYSTEM (PHASE 2+) (GSM); UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; 3G SECURITY; ACCESS SECURITY FOR IP-BASED SERVICES (3GPP TS 33.203 VERSION 14.1.0 RELEASE 14)
TS 102 165-2 : 4.2.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); METHODS AND PROTOCOLS; PART 2: PROTOCOL FRAMEWORK DEFINITION; SECURITY COUNTER MEASURES
ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
ISO/IEC 10181-7:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Security audit and alarms framework
ES 202 382 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING PROTECTION PROFILES
ETR 232 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG); GLOSSARY OF SECURITY TERMINOLOGY
FIPS PUB 140 : 0001 SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES
ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements
ES 202 383 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING SECURITY TARGETS
TR 187 011 : 2.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; APPLICATION OF ISO-15408-2 REQUIREMENTS TO ETSI STANDARDS - GUIDE, METHOD AND APPLICATION WITH EXAMPLES
ETR 237 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG) - BASELINE SECURITY STANDARDS - FEATURES AND MECHANISMS
ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
TS 102 165-1 : 4.2.3 CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA)
IEEE 802.11-2016 IEEE Standard for Information technology--Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
EG 200 234 : 1.2.2 TELECOMMUNICATIONS SECURITY; A GUIDE TO SPECIFYING REQUIREMENTS FOR CRYPTOGRAPHIC ALGORITHMS
ISO/IEC 10181-3:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Access control framework
FIPS PUB 197 : 2001 ADVANCED ENCRYPTION STANDARD (AES)
ISO/IEC 10181-4:1997 Information technology Open Systems Interconnection Security frameworks for open systems: Non-repudiation framework Part 4:
ISO/IEC 10181-2:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework
ISO/IEC 10181-5:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Confidentiality framework
ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
ISO/IEC 10181-6:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Integrity framework
EG 202 387 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD FOR APPLICATION OF COMMON CRITERIA TO ETSI DELIVERABLES
EG 202 238 : 1.1.1 TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON); EVALUATION CRITERIA FOR CRYPTOGRAPHIC ALGORITHMS
ETR 332 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG)
EN 300 392-7 : 3.3.1 TERRESTRIAL TRUNKED RADIO (TETRA); VOICE PLUS DATA (V+D); PART 7: SECURITY
ISO/IEC 13335-1:2004 Information technology Security techniques Management of information and communications technology security Part 1: Concepts and models for information and communications technology security management
FIPS PUB 180 : 2002 SECURE HASH STANDARD

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.