ISO/IEC TR refines the AVA_VAN assurance family activities defined in ISO/IEC and provides more specific guidance on the identification. evaluators that use ISO/IEC and ISO/IEC for a security evaluation. This document is intended to be fully consistent with ISO/IEC ; however. Title: ISO/IEC – Information technology — Security techniques — Methodology for IT security evaluation. Source reference: livelink.

Author: Kelkree Voodoozilkree
Country: Sri Lanka
Language: English (Spanish)
Genre: Technology
Published (Last): 5 January 2010
Pages: 361
PDF File Size: 7.11 Mb
ePub File Size: 9.51 Mb
ISBN: 753-5-44171-601-6
Downloads: 63506
Price: Free* [*Free Regsitration Required]
Uploader: Tygobar

Worldwide Standards We can source any standard from anywhere in the world.


Furthermore, it will also give a level of confidence that the PP solves the stated security problem. The faster, easier way to work with standards. Amazon Prime Music Stream millions of songs, ad-free. See our Returns Policy.

If you are a seller for this product, would you like to suggest updates through seller support? Audible Download Audio Books.

Search all products by. The Common Criteria allow consumer, especially isk consumer groups and communities of interest, to express their security needs for a type of product in an unambiguous manner.

Purchase Standards Details

Accept and continue Learn more about the cookies we use and how to change your settings. This service provides customers confidence in the security functionality provided by a TOE. Read more Read less. Applicable only on ATM card, debit card or credit card orders. Maintenance of assurance provides customers with a cost effective method of maintaining the same assurance level for a certified TOE after modification and update throughout its normal lifecycle.

TOP Related Posts  D-LINK 2100AP PDF

To get the free app, enter mobile phone number.

Please download Chrome or Firefox or view our browser tips. Delivery and Returns see our delivery rates and policies thinking of returning an item? Security evaluation and certification of CC Protection Profiles The Common Criteria allow consumer, especially in consumer groups and communities of interest, to express their security needs for jec type of product in an unambiguous manner. Would you like to tell us about a lower price? Share your thoughts with other customers. You may experience issues viewing this site isso Internet Explorer 9, 10 or This service provides customers with specific Malaysia national security requirements confidence that CC certified ICT products from other schemes meet these requirements.

Shopbop Designer Fashion Brands. Your basket is empty. You may find similar items within these categories by selecting from the choices below:. Certification provides independent confirmation of the evaluation results validity. Be the first to review this item Would you like to tell us about a lower price? Find Similar Items This product falls into the following categories.

This can be done by writing an implementation-independent structure document call a Protection Profile PP.

ISO/IEC 18045

This approach will minimise the redundancy in the security evaluation. Get to Know Us. Visit our Help Pages. Evaluating a PP is required to demonstrate that the PP is sound and internally consistent. Then you can start reading Kindle books on your smartphone, tablet, or computer – no Kindle device required. See all free Kindle reading apps. Furthermore, it will also prove that the TOE meets its security requirements at a defined level of assurance.


This website is best viewed with browser version of up to Microsoft Internet Explorer 8 or Firefox 3. Supporting Services To support the delivery of certification and evaluation services, the MyCC Scheme deliver the following additional services: We use cookies to make our website easier to use and to better understand your needs. Click to learn more.

ISO/IEC 18045:2008

Cashback within 3 days from shipment. These properties are necessary for the PP to be suitable for use as the basis for writing a Security Target ST and guidance for the developers to develop a product or system that meet the consumers needs.

Offer valid only once per customer. This service provides customers with validated security requirements to support selection iex procurement of ICT products. Enter your mobile number or email address below and we’ll send you a link to download the free Kindle App.

I’d like to read this book on Kindle Don’t have a Kindle? Here’s how terms and conditions apply. Write a product review.

Related Posts