• 0
    • ارسال درخواست
    • حذف همه
    • Industrial Standards
    • Defence Standards
  • درباره ما
  • درخواست موردی
  • فهرست استانداردها
    • Industrial Standards
    • Defence Standards
  • راهنما
  • Login
  • لیست خرید شما 0
    • ارسال درخواست
    • حذف همه
View Item 
  •   YSE
  • Industrial Standards
  • DIN - Deutsches Institut für Normung e. V.
  • View Item
  •   YSE
  • Industrial Standards
  • DIN - Deutsches Institut für Normung e. V.
  • View Item
  • All Fields
  • Title(or Doc Num)
  • Organization
  • Year
  • Subject
Advanced Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Archive

DIN CEN ISO/TS 17574

English -- Electronic fee collection - Guidelines for security protection profiles (ISO/TS 17574:2009); English version CEN ISO/TS 17574:2009;
German -- Elektronische Gebuehrenerhebung - Leitfaden fuer Sicherheitsprofile (ISO/TS 17574:2009); Englische Fassung CEN ISO/TS 17574:2009

Organization:
DIN - Deutsches Institut für Normung e. V.
Year: 2011

Abstract: This Technical Specification provides a guideline for preparation and evaluation of security requirements specifications, referred to as Protection Profiles (PP) in the ISO/IEC 15408 series and in ISO/IEC TR 15446. By a Protection Profile (PP) is meant a set of security requirements for a category of products or systems that meet specific needs. A typical example would be a PP for On-Board Equipment (OBEs) to be used in an EFC system.
This Technical Specification should be read in conjunction with the underlying standards ISO/IEC 15408 and ISO/IEC TR 15446. Although a layman could read the first part of the document to have an overview on how to prepare a Protection Profile for EFC equipment, the annexes, in particular A.4 and A.5, require that the reader be familiar with ISO/IEC 15408. The document uses an OBE with an integrated circuit(s) card (ICC) as an example to describe both the structure of the PP as well as the proposed content.
The main purpose of a PP is to analyse the security environment of a subject and then to specify the requirements meeting the threats that are the output of the security environment analysis. The subject studied
is called the target of evaluation (TOE). In this document, an OBE with an ICC is used as an example of the TOE.
The preparatory work of EFC/PP consists of the steps shown in Figure 2 (in line with the contents described in Clause 5).
A PP may be registered publicly by the entity preparing the PP in order to make it known and available to other parties that may use the same PP for their own EFC systems.
By a Security Target (ST) is meant a set of security requirements and specifications to be used as the basis for evaluation of an identified TOE. While the PP could be looked upon as the EFC operator requirements the ST could be looked upon as the documentation of a supplier as for the compliance with and fulfilment of the PP for the TOE, e.g. an OBE.
Figure 3 shows a simplified picture and example of the relationships between the EFC operator, the EFC equipment supplier and an evaluator. For an international registry organization, i.e. Common Criteria Recognition Arrangement (CCRA) and current registered PPs, please refer to Annex D.
The ST is similar to the PP, except that it contains additional implementation-specific information detailing how the security requirements are realised in a particular product or system. Hence, the ST includes the following parts not found in a PP:
— a TOE summary specification that presents the TOE-specific security functions and assurance measures;
— an optional PP claims the portion that explains PPs with which the ST is claimed to be conformant (if any)
— a rationale containing additional evidence establishing that the TOE summary specifications ensure satisfaction of the implementation-independent requirements, and that claims about PP conformance are satisfied;
— actual security functions of EFC products will be designed based on this ST; see example in Figure 4.
TOE for EFC is limited to EFC specific roles and interfaces shown in Figure 5. Since the existing financial security standards and criteria are applicable to other external roles and interfaces, they are assumed to be outside the scope of TOE for EFC.
The security evaluation is performed by assessing the security related properties of roles, entities and interfaces defined in STs, as opposed to assessing complete processes which often are distributed over more entities and interfaces than those covered by the TOE of this CEN/ISO Technical Specification.
NOTE Assessing security issues for complete processes is a complimentary approach, which may well be beneficial to apply when evaluating the security of a system.
In Annex A, the guideline for preparing EFC/PP is described by using an OBE as an example of EFC products. The crucial communication link (between the OBE and the RSE) is based on DSRC.
URI: http://yse.yabesh.ir/std;quessioutho4703177793325273135A68A10958014/handle/yse/228993
Subject: Data security
Collections :
  • DIN - Deutsches Institut für Normung e. V.
  • Download PDF : (1.560Mb)
  • Show Full MetaData Hide Full MetaData
  • Statistics

    DIN CEN ISO/TS 17574

Show full item record

contributor authorDIN - Deutsches Institut für Normung e. V.
date accessioned2017-09-04T18:47:45Z
date available2017-09-04T18:47:45Z
date copyright2011.07.01
date issued2011
identifier otherKMZMMEAAAAAAAAAA.pdf
identifier urihttp://yse.yabesh.ir/std;quessioutho4703177793325273135A68A10958014/handle/yse/228993
description abstractThis Technical Specification provides a guideline for preparation and evaluation of security requirements specifications, referred to as Protection Profiles (PP) in the ISO/IEC 15408 series and in ISO/IEC TR 15446. By a Protection Profile (PP) is meant a set of security requirements for a category of products or systems that meet specific needs. A typical example would be a PP for On-Board Equipment (OBEs) to be used in an EFC system.
This Technical Specification should be read in conjunction with the underlying standards ISO/IEC 15408 and ISO/IEC TR 15446. Although a layman could read the first part of the document to have an overview on how to prepare a Protection Profile for EFC equipment, the annexes, in particular A.4 and A.5, require that the reader be familiar with ISO/IEC 15408. The document uses an OBE with an integrated circuit(s) card (ICC) as an example to describe both the structure of the PP as well as the proposed content.
The main purpose of a PP is to analyse the security environment of a subject and then to specify the requirements meeting the threats that are the output of the security environment analysis. The subject studied
is called the target of evaluation (TOE). In this document, an OBE with an ICC is used as an example of the TOE.
The preparatory work of EFC/PP consists of the steps shown in Figure 2 (in line with the contents described in Clause 5).
A PP may be registered publicly by the entity preparing the PP in order to make it known and available to other parties that may use the same PP for their own EFC systems.
By a Security Target (ST) is meant a set of security requirements and specifications to be used as the basis for evaluation of an identified TOE. While the PP could be looked upon as the EFC operator requirements the ST could be looked upon as the documentation of a supplier as for the compliance with and fulfilment of the PP for the TOE, e.g. an OBE.
Figure 3 shows a simplified picture and example of the relationships between the EFC operator, the EFC equipment supplier and an evaluator. For an international registry organization, i.e. Common Criteria Recognition Arrangement (CCRA) and current registered PPs, please refer to Annex D.
The ST is similar to the PP, except that it contains additional implementation-specific information detailing how the security requirements are realised in a particular product or system. Hence, the ST includes the following parts not found in a PP:
— a TOE summary specification that presents the TOE-specific security functions and assurance measures;
— an optional PP claims the portion that explains PPs with which the ST is claimed to be conformant (if any)
— a rationale containing additional evidence establishing that the TOE summary specifications ensure satisfaction of the implementation-independent requirements, and that claims about PP conformance are satisfied;
— actual security functions of EFC products will be designed based on this ST; see example in Figure 4.
TOE for EFC is limited to EFC specific roles and interfaces shown in Figure 5. Since the existing financial security standards and criteria are applicable to other external roles and interfaces, they are assumed to be outside the scope of TOE for EFC.
The security evaluation is performed by assessing the security related properties of roles, entities and interfaces defined in STs, as opposed to assessing complete processes which often are distributed over more entities and interfaces than those covered by the TOE of this CEN/ISO Technical Specification.
NOTE Assessing security issues for complete processes is a complimentary approach, which may well be beneficial to apply when evaluating the security of a system.
In Annex A, the guideline for preparing EFC/PP is described by using an OBE as an example of EFC products. The crucial communication link (between the OBE and the RSE) is based on DSRC.
languageEnglish
titleDIN CEN ISO/TS 17574num
titleEnglish -- Electronic fee collection - Guidelines for security protection profiles (ISO/TS 17574:2009); English version CEN ISO/TS 17574:2009en
titleGerman -- Elektronische Gebuehrenerhebung - Leitfaden fuer Sicherheitsprofile (ISO/TS 17574:2009); Englische Fassung CEN ISO/TS 17574:2009other
typestandard
page70
statusActive
treeDIN - Deutsches Institut für Normung e. V.:;2011
contenttypefulltext
subject keywordsData security
subject keywordsDatensicherheit
subject keywordsElectronic systems
subject keywordselektronisches System
subject keywordsGebuehren
subject keywordsRoad transport
subject keywordsStrassenverkehr
subject keywordsTariffs
subject keywordsTelematics
subject keywordsTelematik

Related items

Showing items related by title, author, creator and subject.

  • DIN CEN ISO/TS 17574 

    Type: standard
    Source: DIN - Deutsches Institut für Normung e. V.:;2011
    Organization : DIN - Deutsches Institut für Normung e. V.
    Subject(s) : Data security , Datensicherheit , Electronic systems , elektronisches System , Gebuehren , Road transport , Strassenverkehr , Tariffs , Telematics , Telematik ,
    Request PDF
  • DIN CEN ISO/TS 17574 

    Type: standard
    Source: DIN - Deutsches Institut fš?r Normung e. V.:;2017
    Organization : DIN - Deutsches Institut fš?r Normung e. V.
    Abstract: Scope: This document provides guidelines for preparation and evaluation of security requirements specifications, referred to as Protection Profiles (PP) in ISO/IEC 15408 (all parts) and in ISO/IEC TR 15446. By Protection ...
    Request PDF
  • DIN CEN ISO/TS 17574 

    Type: standard
    Source: DIN - Deutsches Institut fš?r Normung e. V.:;2017
    Organization : DIN - Deutsches Institut fš?r Normung e. V.
    Abstract: Scope: This document provides guidelines for preparation and evaluation of security requirements specifications, referred to as Protection Profiles (PP) in ISO/IEC 15408 (all parts) and in ISO/IEC TR 15446. By Protection ...
    Request PDF
DSpace software copyright © 2017-2020  DuraSpace
نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
yabeshDSpacePersian
 
DSpace software copyright © 2017-2020  DuraSpace
نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
yabeshDSpacePersian