17/30351732 DC : 0
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
BS ISO/IEC 19896-1 - INFORMATION TECHNOLOGY - IT SECURITY TECHNIQUES - COMPETENCE REQUIREMENTS FOR INFORMATION SECURITY TESTERS AND EVALUATORS - PART 1: INTRODUCTION, CONCEPTS AND GENERAL REQUIREMENTS
Hardcopy , PDF
31-03-2018
English
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviated Terms
5 Concepts
6 Elements of competence
7 Competency levels
8 Measurement of elements of competence
Annex A (informative) - Framework for describing
competence requirements
Annex B (informative) - Example record of experience
and competence
Bibliography
BS ISO/IEC 19896-1.
Committee |
IST/33/3
|
DocumentType |
Draft
|
Pages |
20
|
PublisherName |
British Standards Institution
|
Status |
Superseded
|
ISO/IEC 17065:2012 | Conformity assessment — Requirements for bodies certifying products, processes and services |
ISO/IEC 17025:2005 | General requirements for the competence of testing and calibration laboratories |
ISO/IEC 17000:2004 | Conformity assessment Vocabulary and general principles |
ISO/IEC 15408-2:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components |
ISO/IEC 15408-3:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components |
ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
ISO/IEC 24759:2017 | Information technology Security techniques Test requirements for cryptographic modules |
ISO/IEC 17024:2012 | Conformity assessment — General requirements for bodies operating certification of persons |
ISO/IEC 15408-1:2009 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
ISO/IEC TS 17027:2014 | Conformity assessment — Vocabulary related to competence of persons used for certification of persons |
ISO/IEC 18045:2008 | Information technology — Security techniques — Methodology for IT security evaluation |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.