TR 187 011 : 2.1.1
Current
The latest, up-to-date edition.
TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; APPLICATION OF ISO-15408-2 REQUIREMENTS TO ETSI STANDARDS - GUIDE, METHOD AND APPLICATION WITH EXAMPLES
Hardcopy , PDF
English
Intellectual Property Rights
Foreword
1 Scope
2 References
2.1 Normative references
2.2 Informative references
3 Definitions and abbreviations
3.1 Definitions
3.2 Abbreviations
4 Standards, assets and systems
5 Objectives and requirements in security standards
5.1 Overview
5.2 Security objectives
5.3 Security requirements
6 Threat Analysis
7 Specifying security objectives
7.1 Getting started
7.2 Identifying security objectives
7.3 Formulating security objectives
7.4 Validating security objectives
8 Requirements capture
8.1 The characteristics of requirements
8.2 Specifying requirements
9 Specifying security objectives and requirements
using ISO/IEC 15408-2
9.1 Overview
9.2 Characterizing functional components
9.3 Identifying ISO/IEC 15408-2 component elements
in standards
9.4 Integration with TVRA
Annex A: Worked examples of using the method in NGN
applications
A.1 RACS
A.2 Unsolicited communication
A.3 Media security
A.4 IPTV
History
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.