• There are no items in your cart

I.S. EN 419251-3:2013

Current
Current

The latest, up-to-date edition.

SECURITY REQUIREMENTS FOR DEVICE FOR AUTHENTICATION - PART 3: ADDITIONAL FUNCTIONALITY FOR SECURITY TARGETS
Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

01-01-2013

Preview

For Harmonized Standards, check the EU site to confirm that the Standard is cited in the Official Journal.

Only cited Standards give presumption of conformance to New Approach Directives/Regulations.

Foreword
1 Scope
2 Normative references
3 Conformance
4 Terms and definitions
5 Symbols and abbreviations
6 Overview of the target of evaluation
7 Security problem definition
8 Security objectives
9 Extended component definition - Definition of
   the Family FCS_RNG
10 Security requirements
Bibliography
Index

Covers packages that define security requirements for an authentication device.

DocumentType
Standard
Pages
82
PublisherName
National Standards Authority of Ireland
Status
Current

Standards Relationship
EN 419251-3:2013 Identical

EN 419251-2:2013 Security requirements for device for authentication - Part 2: Protection profile for extension for trusted channel to certificate generation application
ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
PREN 14169-3 : DRAFT 2010 PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 3: DEVICE WITH KEY IMPORT
ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
EN 419251-1:2013 Security requirements for device for authentication - Part 1: Protection profile for core functionality
PREN 14169-5 : DRAFT 2010 PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 5: DEVICE WITH KEY GENERATION AND TRUSTED COMMUNICATION WITH SIGNATURE-CREATION APPLICATION
PREN 14169-2 : DRAFT 2010 PROTECTION PROFILE FOR SECURE SIGNATURE CREATION DEVICE - PART 2: DEVICE WITH KEY GENERATION
PREN 14169-6 : DRAFT 2010 PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 6: DEVICE WITH KEY IMPORT AND TRUSTED COMMUNICATION WITH SIGNATURE-CREATION APPLICATION
ISO/IEC 10181-2:1996 Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework
PREN 14169-4 : DRAFT 2010 PROTECTION PROFILES FOR SECURE SIGNATURE CREATION DEVICE - PART 4: EXTENSION FOR DEVICE WITH KEY GENERATION AND TRUSTED COMMUNICATION WITH CERTIFICATE GENERATION APPLICATION
ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
ISO/IEC 18045:2008 Information technology — Security techniques — Methodology for IT security evaluation

View more information
US$118.39
Excluding Tax where applicable

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.