• Shopping Cart
    There are no items in your cart
Please Select Your Option.
It seems you are away from your “home” country. Do you wish to be re-directed to your “home” store? If you choose “YES”, you will see product, taxation, and shipping information relevant to your country. If you select “NO”, the current store's conditions will apply.
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

ETR 332 : 20001

Current

Current

The latest, up-to-date edition.

SECURITY TECHNIQUES ADVISORY GROUP (STAG)

Available format(s)

Hardcopy , PDF

Language(s)

English

Foreword
Introduction
1 Scope
2 References
3 Abbreviations
4 General Methodology
  4.1 Working procedure within ETSI
  4.2 Simplifications and models
  4.3 Explanation of terminology
  4.4 Methodology flow chart
5 Security objectives definition
  5.1 Identification of the system's nature
  5.2 Identification of individual security objectives
6 System review
7 Threat analysis
  7.1 Identification of system-specific threats
  7.2 Identification of threats based on external requirements
  7.3 Guidelines to the identification of data protection threats
  7.4 Guidelines to the identification of threats related to
      inter-network communication
  7.5 Guidelines to the identification of threats to system
      integrity
  7.6 Guidelines to the identification of threats due to
      security policies
8 Risk assessment
  8.1 Evaluation of threats and definition of risks
  8.2 Determine threshold for major threats respectively risks
  8.3 Evaluation of the global risk, risk assessment report
  8.4 TC/STC management decision
  8.5 Setting up the final risk assessment report
9 Security requirements
Annex A: List of work items referred to in this ETR
History

Gives guidance and support for a comprehensive analysis of threats, vulnerabilities, risks and for the compilation of a specific set of security requirements.

Committee
NA
DocumentType
Standard
Pages
31
PublisherName
European Telecommunications Standards Institute
Status
Current

ISO/IEC 16500-7:1999 Information technology Generic digital audio-visual systems Part 7: Basic security tools
CSA ISO/IEC 16500-1 : 2002 : R2015 INFORMATION TECHNOLOGY - GENERIC DIGITAL AUDIO-VISUAL SYSTEMS - PART 1: SYSTEM REFERENCE MODELS AND SCENARIOS
CSA ISO/IEC 16500-1 : 2002 : R2010 INFORMATION TECHNOLOGY - GENERIC DIGITAL AUDIO-VISUAL SYSTEMS - PART 1: SYSTEM REFERENCE MODELS AND SCENARIOS
CSA ISO/IEC 16500-7 : 2002 : R2015 INFORMATION TECHNOLOGY - GENERIC DIGITAL AUDIO-VISUAL SYSTEMS - PART 7: BASIC SECURITY TOOLS
CSA ISO/IEC 16500-7 : 2002 INFORMATION TECHNOLOGY - GENERIC DIGITAL AUDIO-VISUAL SYSTEMS - PART 7: BASIC SECURITY TOOLS
CSA ISO/IEC 16500-7 : 2002 : R2010 INFORMATION TECHNOLOGY - GENERIC DIGITAL AUDIO-VISUAL SYSTEMS - PART 7: BASIC SECURITY TOOLS
ISO/IEC 16500-1:1999 Information technology Generic digital audio-visual systems Part 1: System reference models and scenarios
TR 102 780 : 1.1.1 METHODS FOR TESTING AND SPECIFICATION (MTS); SECURITY; GUIDE TO THE USE OF METHODS IN DEVELOPMENT OF ETSI SECURITY STANDARDS
TR 101 771 : 1.1.1 TIPHON RELEASE 4; SERVICE INDEPENDENT REQUIREMENTS DEFINITION; THREAT ANALYSIS
ETR 236 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG) - BASELINE SECURITY STANDARDS - FEATURES AND MECHANISMS
EG 202 387 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD FOR APPLICATION OF COMMON CRITERIA TO ETSI DELIVERABLES
TS 121 133 : 4.1.0 UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); 3G SECURITY; SECURITY THREATS AND REQUIREMENTS
TR 101 365 : 1.1.1 INTELLIGENT NETWORK (IN); IN INTERCONNECT THREAT ANALYSIS
GS NFV-SEC 006 : 1.1.1 NETWORK FUNCTIONS VIRTUALISATION (NFV); SECURITY GUIDE; REPORT ON SECURITY ASPECTS AND REGULATORY CONCERNS
ES 202 382 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING PROTECTION PROFILES
SR 002 564 : 2.0.0 APPLICABILITY OF EXISTING ETSI AND ETSI/3GPP DELIVERABLES TO EHEALTH
TR 102 528 : 1.1.1 LAWFUL INTERCEPTION (LI); INTERCEPTION DOMAIN ARCHITECTURE FOR IP NETWORKS
TS 102 165-1 : 4.2.3 CYBER; METHODS AND PROTOCOLS; PART 1: METHOD AND PRO FORMA FOR THREAT, VULNERABILITY, RISK ANALYSIS (TVRA)
CSA ISO/IEC 16500-1:2002 INFORMATION TECHNOLOGY - GENERIC DIGITAL AUDIO-VISUAL SYSTEMS - PART 1: SYSTEM REFERENCE MODELS AND SCENARIOS
ES 202 383 : 1.1.1 TELECOMMUNICATIONS AND INTERNET CONVERGED SERVICES AND PROTOCOLS FOR ADVANCED NETWORKING (TISPAN); SECURITY DESIGN GUIDE; METHOD AND PROFORMA FOR DEFINING SECURITY TARGETS
TR 102 512 : 1.1.1 TERRESTRIAL TRUNKED RADIO (TETRA); SECURITY; SECURITY REQUIREMENTS ANALYSIS FOR MODULATION ENHANCEMENTS TO TETRA
TR 101 943 : 2.2.1 LAWFUL INTERCEPTION (LI); CONCEPTS OF INTERCEPTION IN A GENERIC NETWORK ARCHITECTURE

ETR 232 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG); GLOSSARY OF SECURITY TERMINOLOGY
ETR 083 : 20001 UNIVERSAL PERSONAL TELECOMMUNICATION (UPT) - GENERAL UPT SECURITY ARCHITECTURE
ETR 330 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG)
ETR 236 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG) - BASELINE SECURITY STANDARDS - FEATURES AND MECHANISMS
ETR 234 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG); A GUIDE TO SPECIFYING REQUIREMENTS FOR CRYPTOGRAPHIC ALGORITHMS
ETR 237 : 20001 SECURITY TECHNIQUES ADVISORY GROUP (STAG) - BASELINE SECURITY STANDARDS - FEATURES AND MECHANISMS
ETR 233 : 20001 TELECOMMUNICATIONS SECURITY; A DIRECTORY OF SECURITY FEATURES IN ETSI STANDARDS
ETR 340 : 20001 TELECOMMUNICATIONS SECURITY
ETR 086-3 : 20001 TRANS EUROPEAN TRUNKED RADIO (TETRA) SYSTEMS - TECHNICAL REQUIREMENTS SPECIFICATION - SECURITY ASPECTS

£15.00
Excluding VAT

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.