Customer Support: 131 242

  • There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

TS 102 165-1 : 4.2.3

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA)

Available format(s)

Hardcopy , PDF

Superseded date

13-01-2022

$115.12
Including GST where applicable

Intellectual Property Rights
Foreword
Modal verbs terminology
Introduction
1 Scope
2 References
3 Definitions, symbols and abbreviations
4 Introduction
5 TVRA method
6 Method process
Annex A (normative) - TVRA proforma
Annex B (informative) - The role of motivation
Annex C - Void
Annex D (informative) - Denial of service attacks
Annex E (informative) - TVRA database structure
Annex F - Void
Annex G (informative) - TVRA Risk Calculation
        Template and Tool
Annex H (informative) - TVRA Countermeasure Cost-Benefit
        Analysis Template and Tool
Annex I (informative) - Bibliography
Annex J (informative) - Change history
History

Specifies a method primarily for use by ETSI standards developers in undertaking an analysis of the threats, risks and vulnerabilities of an Information and Communications Technology (ICT) system.

Committee
CYBER
DocumentType
Standard
Pages
79
PublisherName
European Telecommunications Standards Institute
Status
Superseded
SupersededBy

PD CEN/TR 16968:2016 Electronic Fee Collection. Assessment of security measures for applications using Dedicated Short-Range Communication
GS ENI 002 : 1.1.1 EXPERIENTIAL NETWORKED INTELLIGENCE (ENI); ENI REQUIREMENTS
TR 102 764 : 1.1.1 EHEALTH; ARCHITECTURE; ANALYSIS OF USER SERVICE MODELS, TECHNOLOGIES AND APPLICATIONS SUPPORTING EHEALTH
TR 102 780 : 1.1.1 METHODS FOR TESTING AND SPECIFICATION (MTS); SECURITY; GUIDE TO THE USE OF METHODS IN DEVELOPMENT OF ETSI SECURITY STANDARDS
TR 187 007 : 2.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); FEASIBILITY STUDY ON MEDIA SECURITY IN TISPAN NGN
EG 202 549 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); DESIGN GUIDE; APPLICATION OF SECURITY COUNTERMEASURES TO SERVICE CAPABILITIES
TR 185 012 : 3.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); FEASIBILITY STUDY OF SECURITY MECHANISMS FOR CUSTOMER PREMISES NETWORKS CONNECTED TO TISPAN NGN
TR 102 893 : 1.1.1 INTELLIGENT TRANSPORT SYSTEMS (ITS); SECURITY; THREAT, VULNERABILITY AND RISK ANALYSIS (TVRA)
TR 103 456 : 1.1.1 CYBER; IMPLEMENTATION OF THE NETWORK AND INFORMATION SECURITY (NIS) DIRECTIVE
EG 202 387 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD FOR APPLICATION OF COMMON CRITERIA TO ETSI DELIVERABLES
TR 102 420 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); REVIEW OF ACTIVITY ON SECURITY
TR 187 020 : 1.1.1 RADIO FREQUENCY IDENTIFICATION (RFID); COORDINATED ESO RESPONSE TO PHASE 1 OF EU MANDATE M436
GS NFV-SEC 006 : 1.1.1 NETWORK FUNCTIONS VIRTUALISATION (NFV); SECURITY GUIDE; REPORT ON SECURITY ASPECTS AND REGULATORY CONCERNS
GS NFV-SEC 014 : 3.1.1 NETWORK FUNCTIONS VIRTUALISATION (NFV) RELEASE 3; NFV SECURITY; SECURITY SPECIFICATION FOR MANO COMPONENTS AND REFERENCE POINTS
TR 101 583 : 1.1.1 METHODS FOR TESTING AND SPECIFICATION (MTS); SECURITY TESTING; BASIC TERMINOLOGY
SR 002 564 : 2.0.0 APPLICABILITY OF EXISTING ETSI AND ETSI/3GPP DELIVERABLES TO EHEALTH
TS 102 165-2 : 4.2.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); METHODS AND PROTOCOLS; PART 2: PROTOCOL FRAMEWORK DEFINITION; SECURITY COUNTER MEASURES
TR 187 011 : 2.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; APPLICATION OF ISO-15408-2 REQUIREMENTS TO ETSI STANDARDS - GUIDE, METHOD AND APPLICATION WITH EXAMPLES
CEN/TR 16968:2016 Electronic Fee Collection - Assessment of security measures for applications using Dedicated Short-Range Communication
GR NFV-IFA 028 : 3.1.1 NETWORK FUNCTIONS VIRTUALISATION (NFV) RELEASE 3; MANAGEMENT AND ORCHESTRATION; REPORT ON ARCHITECTURE OPTIONS TO SUPPORT MULTIPLE ADMINISTRATIVE DOMAINS
TR 187 002 : 3.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); TISPAN NGN SECURITY (NGN SEC); THREAT, VULNERABILITY AND RISK ANALYSIS
TS 101 884-1 : 4.1.1 TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON) RELEASE 4; TECHNOLOGY MAPPING; PART 1: IMPLEMENTATION OF TIPHON ARCHITECTURE USING SIP
TS 187 016 : 3.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; IDENTITY PROTECTION (PROTECTION PROFILE)
TR 187 023 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY ASSURANCE PROFILE FOR SECURED TELECOMMUNICATIONS OPERATIONS; STATEMENT OF NEEDS FOR SECURITY ASSURANCE MEASUREMENT IN OPERATIONAL TELECOM INFRASTRUCTURES
ES 202 383 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING SECURITY TARGETS
S.R. CEN/TR 16968:2016 ELECTRONIC FEE COLLECTION - ASSESSMENT OF SECURITY MEASURES FOR APPLICATIONS USING DEDICATED SHORT-RANGE COMMUNICATION
TR 187 009 : 2.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); FEASIBILITY STUDY OF PREVENTION OF UNSOLICITED COMMUNICATION IN THE NGN
TS 102 747 : 1.1.1 HUMAN FACTORS (HF); PERSONALIZATION AND USER PROFILE MANAGEMENT; ARCHITECTURAL FRAMEWORK
TS 101 882-2 : 4.1.1 TELECOMMUNICATIONS AND INTERNET PROTOCOL HARMONIZATION OVER NETWORKS (TIPHON) RELEASE 4; PROTOCOL FRAMEWORK DEFINITION; PART 2: REGISTRATION AND SERVICE ATTACHMENT SERVICE META-PROTOCOL DEFINITION
GR QSC 004 : 1.1.1 QUANTUM-SAFE CRYPTOGRAPHY; QUANTUM-SAFE THREAT ASSESSMENT
TR 103 167 : 1.1.1 MACHINE-TO-MACHINE COMMUNICATIONS (M2M); THREAT ANALYSIS AND COUNTER-MEASURES TO M2M SERVICE LAYER
TR 187 014 : 2.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); ESECURITY; USER GUIDE TO ETVRA WEB-DATABASE
TR 103 087 : 1.2.1 RECONFIGURABLE RADIO SYSTEMS (RRS); SECURITY RELATED USE CASES AND THREATS
TS 102 556 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); PROTECTION PROFILE
TS 187 003 : 3.4.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; SECURITY ARCHITECTURE

TS 102 165-2 : 4.2.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); METHODS AND PROTOCOLS; PART 2: PROTOCOL FRAMEWORK DEFINITION; SECURITY COUNTER MEASURES
TR 102 055 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); ENUM SCENARIOS FOR USER AND INFRASTRUCTURE ENUM
ISO/IEC 15408-2:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components
ES 202 382 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING PROTECTION PROFILES
ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements
ES 202 383 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING SECURITY TARGETS
TS 187 001 : 3.9.1 NETWORK TECHNOLOGIES (NTECH); NGN SECURITY (SEC); REQUIREMENTS
TR 187 011 : 2.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN SECURITY; APPLICATION OF ISO-15408-2 REQUIREMENTS TO ETSI STANDARDS - GUIDE, METHOD AND APPLICATION WITH EXAMPLES
TR 187 002 : 3.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); TISPAN NGN SECURITY (NGN SEC); THREAT, VULNERABILITY AND RISK ANALYSIS
TS 102 556 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); PROTECTION PROFILE
ISO/IEC 15408-3:2008 Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components
ISO/IEC 27002:2013 Information technology Security techniques Code of practice for information security controls
AS/NZS 4360:2004 Risk management
TS 102 051 : 1.1.1 ENUM ADMINISTRATION IN EUROPE
EG 202 549 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); DESIGN GUIDE; APPLICATION OF SECURITY COUNTERMEASURES TO SERVICE CAPABILITIES
ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
TR 102 420 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); REVIEW OF ACTIVITY ON SECURITY
EG 202 387 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD FOR APPLICATION OF COMMON CRITERIA TO ETSI DELIVERABLES
ETR 332 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG)
ES 282 004 : 3.4.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); NGN FUNCTIONAL ARCHITECTURE; NETWORK ATTACHMENT SUB-SYSTEM (NASS)

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.

Need help?
Call us on 131 242, then click here to start a Screen Sharing session
so we can help right away! Learn more