ETSI ETR 332-1996 Security Techniques Advisory Group (STAG) Security Requirements Capture《安全技术咨询组(STAG) 安全要求捕捉》.pdf
《ETSI ETR 332-1996 Security Techniques Advisory Group (STAG) Security Requirements Capture《安全技术咨询组(STAG) 安全要求捕捉》.pdf》由会员分享,可在线阅读,更多相关《ETSI ETR 332-1996 Security Techniques Advisory Group (STAG) Security Requirements Capture《安全技术咨询组(STAG) 安全要求捕捉》.pdf(31页珍藏版)》请在麦多课文档分享上搜索。
1、 - STD.ETS1 ETR 332-ENGL L77b I3900855 Olb0113 78b ETSI 1 ECHNICAL REPORT ETR 332 November 1996 Source: ETSI TC-STAG Reference: DTWNA-002509 ICs: 33.020 Key words: Security Security Techniques Advisory Group (STAG); Security requirements capture ETSI European Telecommunications Standards Institute E
2、TSI Secretariat Postai address: F-O6921 Sophia Antipolis CEDEX - FRANCE Office address: 650 Route des Lucioles - Sophia Antipolis - Valbonne - FRANCE X.400: c=fr, a=atlas, p=etsi, s=secretariat - Internet: secretariat Q etsi.fr Tel.: +33 4 92 94 42 O0 - Fax: +33 4 93 65 47 16 Copyright Notification:
3、 No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in ali media. O European Telecommunications Standards Institute 1996. All rights reserved. Page 2 ETR 332: November 1996 Whilst every care has been taken in the p
4、reparation and publication of this document, errors in content, typographical or otherwise, may occur. If you have comments concerning its accuracy, please write to “ETSI Editing and Committee Support Dept.“ at the address shown on the title page. - STD-ETSI ETR 332-ENGL L77b m 3400855 OLbOLL5 557 m
5、 Page 3 ETR 332: November 1996 Contents Foreword . 5 Introduction 5 Scope 7 References 7 Abbreviations . 8 General Methodology 8 4.1 Working procedure within ETSI . 9 4.2 4.3 4.4 Simplifications and models 10 Explanation of terminology . 12 Methodology flow chart 12 Security objectives definition .
6、13 5.1 Identification of the systems nature . 14 5.2 Identification of individual security objectives 15 System review . 15 Threat analysis 19 7.1 Identification of system-specific threats . 22 7.2 Identification of threats based on external requirements . 22 7.3 Guidelines to the identification of
7、data protection threats 22 7.4 Guidelines to the identification of threats related to inter-network communication 23 7.5 Guidelines to the identification of threats to system integrity . 24 7.6 Guidelines to the identification of threats due to security policies 24 Risk assessment . 24 8.1 Evaluatio
8、n of threats and definition of risks . 25 8.2 Determine threshold for major threats respectively risks . 27 8.3 Evaluation of the global risk. risk assessment report 27 8.4 TC/STC management decision . 27 8.5 Setting up the final risk assessment report 27 Security requirements . 28 Annex A: List of
9、work items referred to in this ETR 30 History 31 Page 4 ETR 332: November 1996 Blank page STD-ETSI ETR 332-ENGL L77b 3q00855 OLbOLL7 321 Page 5 ETR 332: November 1996 Foreword This ETSI Technical Report (ETR) has been produced by the Security Techniques Advisory Group (STAG) Technical Committee of t
10、he European Telecommunications Standards Institute (ETSI). Introduction This ETR is one of a set of documents to support ETSI Technical Committees in analysing and defining their specific needs for security and in specifying the security measures that become necessary. This ETR provides guidance and
11、 support for a comprehensive analysis of threats, vulnerabilities, risks and for the compilation of a specific set of security requirements. Advice regarding working procedures and documentation is included. Page 6 ETR 332: November 1996 Blank page STD-ETSI ETR 332-ENGL L99b 3Li00855 OLbOLL LTLi = P
12、age 7 ETR 332: November 1996 1 Scope This ETSI Technical Report (ETR) provides guidance and support for a comprehensive analysis of threats, vulnerabilities, risks and for the compilation of a specific set of security requirements. It is the intention to provide the user of this ETR with a comprehen
13、sive understanding and methodology regarding threats, vulnerabilities, risks and security requirements. The security architecture of a particular system is always unique and the threats and security requirements are very specific to that system. The contents of this paper provide guidelines and chec
14、klists rather than specifying in too much detail in order to facilitate the application by the user. This ETR should enable TCs to start their security work from scratch, to take advantage of the experience from other TCs Security Experts Groups (SEGs) or to adapt solutions that have already been de
15、vised. STCs seeking advice on threat analysis and security requirements capture should ask STAG for support. 2 References , This ETR incorporates by dated and undated reference, provisions from other publications. These normative references are cited at the appropriate places in the text and the pub
16、lications are listed hereafter. For dated references, subsequent amendments to or revisions of any of these publications apply to this ETR only when incorporated in it by amendment or revision. For undated references the latest edition of the publication referred to applies. 11 1 121 31 141 51 161 1
17、71 191 11 11 ETR 236: “Security Techniques Advisory Group (STAG); A guide to the ETSI security standards policy“. ETR 232: “Network Aspects (NA); Security Techniques Advisory Group (STAG); Glossary of security terminology“. ETR 233: “Security Techniques Advisory Group (STAG); A directory of security
18、 features in ETSI standards“. ETR 237: “Security Techniques Advisory Group (STAG); Baseline security standards; Features and mechanisms“. ETR 340: “Security Technical Advisory Group (STAG); Guidelines for security management techniques“. DTRNA-002603: “Security Techniques Advisory Group (STAG); Guid
19、elines for integrating security mechanisms into ETSI standards“. ETR 234: “Security Techniques Advisory Group (STAG); A guide to specifying requirements for cryptographic algorithms“. DTWNA-002701: “Security Techniques Advisory Group (STAG); Guidelines on the relevance of security evaluation to ETSI
20、 standards“. ETR 330: “Security Techniques Advisory Group (STAG); A guide to legislation, recommendations General UPT security architecture“. ETR 086-3: “Trans European Trunked Radio (TETRA) systems; Technical requirements specification Part 3: Security aspects“. 121 COM(90) 314 SYN 287: “Draft EU d
21、irective on the protection of personal data“. i 31 COM(90) 314 SYN 288: “Draft EU directive on the protection of personal data in digital telecommunication networks“. STD.ETS1 ETR 332-ENGL L99b 3900855 OLbOL20 9Lb I Page 8 ETR 332: November 1996 i41 CD-71-91-502-EN-C: “IT Security Evaluation Criteri
22、a (ITSEC)“. 3 Abbreviations For the purposes of this ETR, the following abbreviations apply: ACT DEF DPT ECT ED1 EU ICT ITSEC MNT RPC RT S SAGE SAT SEG SIT SRCP UPT Access Threats system or service Deficiencies Data Protection (Privacy) Threats External (inter-) Communication Threats Electronic Data
23、 Interchange European Union Internal (Intra-) Communication Threats Information Technology Security Evaluation Criteria Management Threats Remote Procedure Call Residual Threat Security feature Security Algorithms Group of Experts Threats generated by Safeguards Security Experts Group System Integri
24、ty Threats Security Requirements Capture Procedure Universal Personal Telecommunication 4 General Methodology The methodology defined here has 3 different aspects: a) working procedure within ETSI; b) simplifications and models; c) methodology flow chart. Page 9 ETR 332: November 1996 4.1 Working pr
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ETSIETR3321996SECURITYTECHNIQUESADVISORYGROUPSTAGSECURITYREQUIREMENTSCAPTURE 安全 技术咨询 STAG 要求 捕捉 PDF

链接地址:http://www.mydoc123.com/p-731792.html