Customer Support: 131 242

  • There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

TR 187 011 : 2.1.1

Current

Current

The latest, up-to-date edition.

TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; APPLICATION OF ISO-15408-2 REQUIREMENTS TO ETSI STANDARDS - GUIDE, METHOD AND APPLICATION WITH EXAMPLES

Available format(s)

Hardcopy , PDF

Language(s)

English

$43.16
Including GST where applicable

Intellectual Property Rights
Foreword
1 Scope
2 References
  2.1 Normative references
  2.2 Informative references
3 Definitions and abbreviations
  3.1 Definitions
  3.2 Abbreviations
4 Standards, assets and systems
5 Objectives and requirements in security standards
  5.1 Overview
  5.2 Security objectives
  5.3 Security requirements
6 Threat Analysis
7 Specifying security objectives
  7.1 Getting started
  7.2 Identifying security objectives
  7.3 Formulating security objectives
  7.4 Validating security objectives
8 Requirements capture
  8.1 The characteristics of requirements
  8.2 Specifying requirements
9 Specifying security objectives and requirements
  using ISO/IEC 15408-2
  9.1 Overview
  9.2 Characterizing functional components
  9.3 Identifying ISO/IEC 15408-2 component elements
      in standards
  9.4 Integration with TVRA
Annex A: Worked examples of using the method in NGN
         applications
      A.1 RACS
      A.2 Unsolicited communication
      A.3 Media security
      A.4 IPTV
History

Specifies a method, based on the application of ISO/IEC 15408-2, for concisely and unambiguously declaring security requirements expressed in ETSI standards.

Committee
TISPAN 07
DocumentType
Standard
Pages
23
PublisherName
European Telecommunications Standards Institute
Status
Current

TR 102 764 : 1.1.1 EHEALTH; ARCHITECTURE; ANALYSIS OF USER SERVICE MODELS, TECHNOLOGIES AND APPLICATIONS SUPPORTING EHEALTH
TR 102 780 : 1.1.1 METHODS FOR TESTING AND SPECIFICATION (MTS); SECURITY; GUIDE TO THE USE OF METHODS IN DEVELOPMENT OF ETSI SECURITY STANDARDS
TR 187 020 : 1.1.1 RADIO FREQUENCY IDENTIFICATION (RFID); COORDINATED ESO RESPONSE TO PHASE 1 OF EU MANDATE M436
GS NFV-SEC 006 : 1.1.1 NETWORK FUNCTIONS VIRTUALISATION (NFV); SECURITY GUIDE; REPORT ON SECURITY ASPECTS AND REGULATORY CONCERNS
TS 187 001 : 3.9.1 NETWORK TECHNOLOGIES (NTECH); NGN SECURITY (SEC); REQUIREMENTS
TS 102 165-1 : 4.2.3 CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA)
TR 187 002 : 3.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); TISPAN NGN SECURITY (NGN SEC); THREAT, VULNERABILITY AND RISK ANALYSIS
TR 187 009 : 2.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); FEASIBILITY STUDY OF PREVENTION OF UNSOLICITED COMMUNICATION IN THE NGN
TS 102 747 : 1.1.1 HUMAN FACTORS (HF); PERSONALIZATION AND USER PROFILE MANAGEMENT; ARCHITECTURAL FRAMEWORK
TR 187 014 : 2.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); ESECURITY; USER GUIDE TO ETVRA WEB-DATABASE
TR 103 087 : 1.2.1 RECONFIGURABLE RADIO SYSTEMS (RRS); SECURITY RELATED USE CASES AND THREATS

EG 201 383 : 1.1.1 METHODS FOR TESTING AND SPECIFICATION (MTS) - USE OF SDL IN ETSI DELIVERABLES - GUIDELINES FOR FACILITATING VALIDATION AND THE DEVELOPMENT OF CONFORMANCE TESTS
ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
ES 202 382 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING PROTECTION PROFILES
ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
TS 102 165-1 : 4.2.3 CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA)
EG 202 106 : 2.1.1 METHODS FOR TESTING AND SPECIFICATION (MTS); GUIDELINES FOR THE USE OF FORMAL SDL AS A DESCRIPTIVE TOOL
EG 201 872 : 1.2.1 METHODS FOR TESTING AND SPECIFICATIONS; METHODOLOGICAL APPROACH TO THE USE OF OBJECT-ORIENTATION DESIGN IN THE STANDARDS MAKING PROCESS
ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
TR 102 420 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); REVIEW OF ACTIVITY ON SECURITY
EG 202 387 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD FOR APPLICATION OF COMMON CRITERIA TO ETSI DELIVERABLES

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

Need help?
Call us on 131 242, then click here to start a Screen Sharing session
so we can help right away! Learn more