Language:
    • Available Formats
    •  
    • Availability
    • Priced From ( in USD )
    • Printed Edition
    • Ships in 1-2 business days
    • $131.00
    • Add to Cart

Customers Who Bought This Also Bought

 

About This Item

 

Full Description

SAME AS ISO/IEC 15408-1

This part of ISO/IEC 15408 establishes the general concepts and principles of IT security evaluation and specifies the general model of evaluation given by various parts of the standard which in its entirety is meant to be used as the basis for evaluation of security properties of IT products. Part one provides an overview of all parts of ISO/IEC 15408 standard. It describes the various parts of the standard; defines the terms and abbreviations to be used in all parts of the standard; establishes the core concept of a Target of Evaluation (TOE); the evaluation context and describes the audience to which the evaluation criteria are addressed. An introduction to the basic security concepts necessary for evaluation of IT products is given. It defines the various operations by which the functional and assurance components given in ISO/IEC 15408-2 and ISO/IEC 15408-3 may be tailored through the use of permitted operations. The key concepts of protection profiles (PP), packages of security requirements and the topic of conformance are specified and the consequences of evaluation, evaluation results are described. This part of ISO/IEC 15408 gives guidelines for the specification of Security Targets (ST) and provides a description of the organization of components throughout the model. General information about the evaluation methodology are given in ISO/IEC 18045 and the scope of evaluation schemes is provided.

 

Document History

  1. DANSK DS/EN ISO/IEC 15408-1


    Information security, cybersecurity and privacy protection – Evaluation criteria for IT security – Part 1: Introduction and general model (ISO/IEC 15408-1:2022)

    • Most Recent
  2. DANSK DS/EN ISO/IEC 15408-1

    👀 currently
    viewing


    Information technology – Security techniques – Evaluation criteria for IT security – Part 1: Introduction and general model (ISO/IEC 15408-1:2009)

    • Historical Version