PRICES include / exclude VAT
Homepage>BS Standards>35 INFORMATION TECHNOLOGY. OFFICE MACHINES>35.030 IT Security>PD ISO/IEC TR 15443-3:2007 Information technology. Security techniques. A framework for IT security assurance Analysis of assurance methods
Sponsored link
immediate downloadReleased: 2008-01-31
PD ISO/IEC TR 15443-3:2007 Information technology. Security techniques. A framework for IT security assurance Analysis of assurance methods

PD ISO/IEC TR 15443-3:2007

Information technology. Security techniques. A framework for IT security assurance Analysis of assurance methods

Format
Availability
Price and currency
English Secure PDF
Immediate download
408.20 USD
English Hardcopy
In stock
408.20 USD
Standard number:PD ISO/IEC TR 15443-3:2007
Pages:72
Released:2008-01-31
ISBN:978 0 580 53232 0
Status:Standard
DESCRIPTION

PD ISO/IEC TR 15443-3:2007


This standard PD ISO/IEC TR 15443-3:2007 Information technology. Security techniques. A framework for IT security assurance is classified in these ICS categories:
  • 35.030 IT Security

1.1 Purpose

The purpose of this part of ISO/IEC TR 15443 is to provide general guidance to an assurance authority in the choice of the appropriate type of international communications techology (ICT) assurance methods and to lay the framework for the analysis of specific assurance methods for specific environments.

1.2 Application

This part of ISO/IEC TR 15443 will allow the user to match specific assurance requirements and/or typical assurance situations with the general characteristics offered by available assurance methods.

1.3 Field of Application

The guidance of this part of ISO/IEC TR 15443 is applicable to the development, implementation and operation of ICT products and ICT systems with security requirements.

1.4 Limitations

Security requirements may be complex, assurance methods are of great diversity, and organisational resources and cultures differ considerably.

Therefore the advice given in this part of ISO/IEC TR 15443 will be qualitative and summary, and the user may need to analyse on his own which methods presented in Part 2 of this Technical Report will suit best his specific deliverables and organisational security requirements.