ISO/IEC TR refines the AVA_VAN assurance family activities defined in ISO/IEC and provides more specific guidance on the identification. evaluators that use ISO/IEC and ISO/IEC for a security evaluation. This document is intended to be fully consistent with ISO/IEC ; however. Title: ISO/IEC – Information technology — Security techniques — Methodology for IT security evaluation. Source reference: livelink.

Author: Daizilkree Kagakinos
Country: French Guiana
Language: English (Spanish)
Genre: Career
Published (Last): 25 August 2008
Pages: 203
PDF File Size: 5.62 Mb
ePub File Size: 7.85 Mb
ISBN: 942-4-79393-296-1
Downloads: 17060
Price: Free* [*Free Regsitration Required]
Uploader: Tojasar

Be the first to review this item Would you like to tell us about a lower price? You may experience issues viewing this site in Internet Explorer 9, 10 or The faster, easier way to work with standards. Get to Know Us. Supporting Services To support the delivery of certification and evaluation services, the MyCC Scheme deliver the following additional services: This website is best viewed with browser version of up to Microsoft Internet Explorer 8 or Firefox 3. This service provides customers with validated security requirements to support selection and procurement of ICT products.

See all free Kindle reading apps. Share your thoughts with other customers. Would you like to tell us about a lower price?

Data storage protection, Data security, Data transfer, Data transmission, Information exchange, Coded representation, Data representation, Data processing, Software engineering techniques, Data handling software. We use cookies to make our website easier to use and to better understand your needs. Delivery and Returns see our delivery rates and policies thinking of returning an item?

There are two processes. Maintenance of assurance provides customers with a cost effective method of maintaining the same assurance level for a certified TOE after modification and update throughout its normal lifecycle. To support the delivery of certification and evaluation services, the MyCC Scheme deliver the following additional services:. Here’s how terms and conditions apply.


If you are a seller for this product, would you like to suggest updates through oec support? This service provides customers with specific Malaysia national security requirements confidence that CC certified ICT products from other schemes meet these requirements. See our Returns Policy. This can be done by writing an implementation-independent structure document call a Protection Profile PP. I’d like to read this book on Kindle Don’t have a Kindle?

Applicable only on ATM card, debit card or credit card orders. You may find similar items within these categories by selecting from the choices below:. Audible Download Audio Books. Cashback within 3 days from shipment. This service recognises that as changes are made to a certified TOE or its environment, evaluation work previously performed need not to be repeated in all circumstances.

Accept and continue Learn more about the cookies we use and how to change your settings. Your basket is empty. Worldwide Standards We can source any standard from anywhere in the world.

Maintenance of assurance for security certified ICT products and systems Maintenance of assurance is a voluntary process that leverages a certified TOE baseline as changes are made to the certified TOE.

Document ICT certification laboratories – European Accreditation

Search all products by. Find Similar Items This product falls into the following categories. Offer valid only once per customer.

Cashback will be credited as Amazon Pay balance within 10 days. Shopbop Designer Fashion Brands. Visit our Help Pages. Please download Chrome or Firefox or view our browser tips. Evaluating a PP is required to demonstrate that the PP is sound and internally consistent.


ISO/IEC 18045:2008

Furthermore, it will also prove that the TOE meets its security requirements at a defined level of assurance.

These properties are necessary for the PP to be suitable for use as the basis for writing a Security Target ST and guidance for the developers to develop a product or system that meet the consumers needs. Learn more about the cookies we use and how to change your settings. This service provides customers confidence in the security functionality provided by a TOE. Read more Read less. Take the smart route to manage medical device compliance.

Furthermore, it will also give a level of confidence that the PP solves the stated security problem. Security evaluation and certification of CC Protection Profiles The Common Criteria allow consumer, especially in consumer groups and communities of interest, to express their security needs for a type of product in an unambiguous manner.

Write a product review. Enter your mobile number or email address below and we’ll send you a link to download the free Kindle App. Amazon Prime Music Stream millions of songs, ad-free. To get the free app, enter mobile phone number.