Language:
    • Available Formats
    • Options
    • Availability
    • Priced From ( in USD )
    • Printed Edition
    • Ships in 1-2 business days
    • $124.00
    • Add to Cart

Customers Who Bought This Also Bought

 

About This Item

 

Full Description

ISO/IEC TR 15443-2:2012 builds on the concepts presented in ISO/IEC TR 15443-1. It provides a discussion of the attributes of security assurance conformity assessment methods that contribute towards making assurance claims and providing assurance evidence to fulfil meeting the assurance requirements for a deliverable.

ISO/IEC TR 15443-2:2012 proposes criteria for comparing and analysing different SACA methods. The reader is cautioned that the methods used as examples in ISO/IEC TR 15443-2:2012 are considered to represent popularly used methods at the time of its writing. New methods may appear, and modification or withdrawal of the methods cited may occur. It is intended that the criteria can be used to describe and compare any SACA method whatever its provenance.

 

Document History

  1. ISO/IEC TR 15443-2:2012

    👀 currently
    viewing


    Information technology - Security techniques - Security assurance framework - Part 2: Analysis

    • Most Recent
  2. ISO/IEC TR 15443-3:2007


    Information technology - Security techniques - A framework for IT security assurance - Part 3: Analysis of assurance methods

    • Historical Version
  3. ISO/IEC TR 15443-2:2005


    Information technology - Security techniques - A framework for IT security assurance - Part 2: Assurance methods

    • Historical Version