• 0
    • ارسال درخواست
    • حذف همه
    • Industrial Standards
    • Defence Standards
  • درباره ما
  • درخواست موردی
  • فهرست استانداردها
    • Industrial Standards
    • Defence Standards
  • راهنما
  • Login
  • لیست خرید شما 0
    • ارسال درخواست
    • حذف همه
View Item 
  •   YSE
  • Industrial Standards
  • ETSI - European Telecommunications Standards Institute
  • View Item
  •   YSE
  • Industrial Standards
  • ETSI - European Telecommunications Standards Institute
  • View Item
  • All Fields
  • Title(or Doc Num)
  • Organization
  • Year
  • Subject
Advanced Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Archive

Cyber Security (CYBER); Methods and protocols; Part 1: Method and pro forma for Threat, Vulnerability, Risk Analysis (TVRA)

ETSI TS 102 165-1 V5.3.1

Organization:
ETSI - European Telecommunications Standards Institute
Year: 2025

ETSI - European Telecommunications Standards Institute

URI: http://yse.yabesh.ir/std;jsessioutho4703177793325273135A68A10958014A0Fa/handle/yse/347638
Subject: authentication
Collections :
  • ETSI - European Telecommunications Standards Institute
  • Download PDF : (633.2Kb)
  • Show Full MetaData Hide Full MetaData
  • Statistics

    Cyber Security (CYBER); Methods and protocols; Part 1: Method and pro forma for Threat, Vulnerability, Risk Analysis (TVRA)

Show full item record

contributor authorETSI - European Telecommunications Standards Institute
date accessioned2025-09-30T23:00:12Z
date available2025-09-30T23:00:12Z
date copyright2025.02
date issued2025
identifier otherts_10216501v050301p.pdf
identifier urihttp://yse.yabesh.ir/std;jsessioutho4703177793325273135A68A10958014A0Fa/handle/yse/347638
languageEnglish
publisherETSI - European Telecommunications Standards Institute
titleCyber Security (CYBER); Methods and protocols; Part 1: Method and pro forma for Threat, Vulnerability, Risk Analysis (TVRA)en
titleETSI TS 102 165-1 V5.3.1num
typestandard
page58
statusPublished
treeETSI - European Telecommunications Standards Institute:;2025
contenttypefulltext
subject keywordsauthentication
subject keywordsCONFIDENTIALITY
subject keywordsSECURITY
scopeTo extend the text regarding the role of AI enabled Threat Agents to the analysis framework. Add text to reinforce that the 10 steps are not directly sequential and to modify/extend the metrics for analysis to better address application to environments such as RED analysis, CSA analysis, and AI analysis by the addition of material in annexes. Also to remove some of the data models recommended as they are out of date. To ensure collaboration in use cases with CEN-CLC/JTC13 and JTC21 as appropriate.
DSpace software copyright © 2017-2020  DuraSpace
نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
yabeshDSpacePersian
 
DSpace software copyright © 2017-2020  DuraSpace
نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
yabeshDSpacePersian