TS 133 203 : 13.1.0
|
DIGITAL CELLULAR TELECOMMUNICATIONS SYSTEM (PHASE 2+) (GSM); UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; 3G SECURITY; ACCESS SECURITY FOR IP-BASED SERVICES (3GPP TS 33.203 VERSION 14.1.0 RELEASE 14) |
TS 102 165-2 : 4.2.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); METHODS AND PROTOCOLS; PART 2: PROTOCOL FRAMEWORK DEFINITION; SECURITY COUNTER MEASURES |
ISO/IEC 15408-2:2008
|
Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components |
ISO/IEC 10181-7:1996
|
Information technology Open Systems Interconnection Security frameworks for open systems: Security audit and alarms framework |
ES 202 382 : 1.1.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING PROTECTION PROFILES |
ETR 232 : 20001
|
SECURITY TECHNIQUES ADVISORY GROUP (STAG); GLOSSARY OF SECURITY TERMINOLOGY |
FIPS PUB 140 : 0001
|
SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES |
ISO/IEC 27001:2013
|
Information technology — Security techniques — Information security management systems — Requirements |
ES 202 383 : 1.1.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING SECURITY TARGETS |
TR 187 011 : 2.1.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; APPLICATION OF ISO-15408-2 REQUIREMENTS TO ETSI STANDARDS - GUIDE, METHOD AND APPLICATION WITH EXAMPLES |
ETR 237 : 20001
|
SECURITY TECHNIQUES ADVISORY GROUP (STAG) - BASELINE SECURITY STANDARDS - FEATURES AND MECHANISMS |
ISO/IEC 15408-3:2008
|
Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components |
TS 102 165-1 : 4.2.3
|
CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA) |
IEEE 802.11-2016
|
IEEE Standard for Information technology--Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications |
EG 200 234 : 1.2.2
|
TELECOMMUNICATIONS SECURITY; A GUIDE TO SPECIFYING REQUIREMENTS FOR CRYPTOGRAPHIC ALGORITHMS |
ISO/IEC 10181-3:1996
|
Information technology Open Systems Interconnection Security frameworks for open systems: Access control framework |
FIPS PUB 197 : 2001
|
ADVANCED ENCRYPTION STANDARD (AES) |
ISO/IEC 10181-4:1997
|
Information technology Open Systems Interconnection Security frameworks for open systems: Non-repudiation framework Part 4: |
ISO/IEC 10181-2:1996
|
Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework |
ISO/IEC 10181-5:1996
|
Information technology Open Systems Interconnection Security frameworks for open systems: Confidentiality framework |
ISO/IEC 15408-1:2009
|
Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
ISO/IEC 10181-6:1996
|
Information technology Open Systems Interconnection Security frameworks for open systems: Integrity framework |
EG 202 387 : 1.1.1
|
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD FOR APPLICATION OF COMMON CRITERIA TO ETSI DELIVERABLES |
EG 202 238 : 1.1.1
|
TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON); EVALUATION CRITERIA FOR CRYPTOGRAPHIC ALGORITHMS |
ETR 332 : 20001
|
SECURITY TECHNIQUES ADVISORY GROUP (STAG) |
EN 300 392-7 : 3.3.1
|
TERRESTRIAL TRUNKED RADIO (TETRA); VOICE PLUS DATA (V+D); PART 7: SECURITY |
ISO/IEC 13335-1:2004
|
Information technology Security techniques Management of information and communications technology security Part 1: Concepts and models for information and communications technology security management |
FIPS PUB 180 : 2002
|
SECURE HASH STANDARD |