Cyber Security (CYBER); Methods and protocols; Part 1: Method and pro forma for Threat, Vulnerability, Risk Analysis (TVRA)
ETSI TS 102 165-1 V5.3.1
Organization:
ETSI - European Telecommunications Standards Institute
Year: 2025
ETSI - European Telecommunications Standards Institute
Subject: authentication
Collections
:
-
Statistics
Cyber Security (CYBER); Methods and protocols; Part 1: Method and pro forma for Threat, Vulnerability, Risk Analysis (TVRA)
Show full item record
| contributor author | ETSI - European Telecommunications Standards Institute | |
| date accessioned | 2025-09-30T23:00:12Z | |
| date available | 2025-09-30T23:00:12Z | |
| date copyright | 2025.02 | |
| date issued | 2025 | |
| identifier other | ts_10216501v050301p.pdf | |
| identifier uri | http://yse.yabesh.ir/std;jsessioutho4703177793325273135A68A10958014A0Fa/handle/yse/347638 | |
| language | English | |
| publisher | ETSI - European Telecommunications Standards Institute | |
| title | Cyber Security (CYBER); Methods and protocols; Part 1: Method and pro forma for Threat, Vulnerability, Risk Analysis (TVRA) | en |
| title | ETSI TS 102 165-1 V5.3.1 | num |
| type | standard | |
| page | 58 | |
| status | Published | |
| tree | ETSI - European Telecommunications Standards Institute:;2025 | |
| contenttype | fulltext | |
| subject keywords | authentication | |
| subject keywords | CONFIDENTIALITY | |
| subject keywords | SECURITY | |
| scope | To extend the text regarding the role of AI enabled Threat Agents to the analysis framework. Add text to reinforce that the 10 steps are not directly sequential and to modify/extend the metrics for analysis to better address application to environments such as RED analysis, CSA analysis, and AI analysis by the addition of material in annexes. Also to remove some of the data models recommended as they are out of date. To ensure collaboration in use cases with CEN-CLC/JTC13 and JTC21 as appropriate. |

درباره ما