Menu
0
Total price
0 €
PRICES include / exclude VAT
>UNE EN ISO/IEC 19790:2020 - Information technology - Security techniques - Security requirements for cryptographic modules (ISO/IEC 19790:2012, including corrected version 2015-12)
sklademVydáno: 2020-05-01
UNE EN ISO/IEC 19790:2020 - Information technology - Security techniques - Security requirements for cryptographic modules (ISO/IEC 19790:2012, including corrected version 2015-12)

UNE EN ISO/IEC 19790:2020

Information technology - Security techniques - Security requirements for cryptographic modules (ISO/IEC 19790:2012, including corrected version 2015-12)

Tecnología de la información. Técnicas de seguridad. Requisitos de seguridad para módulos criptográficos (ISO/IEC 19790:2012, incluyendo versión corregida 2015-12) (Ratificada por la Asociación Española de Normalización en mayo de 2020.)

Format
Availability
Price and currency
Anglicky PDF
Immediate download
Printable
158.30 €
Anglicky Hardcopy
In stock
158.30 €
Označení normy:UNE EN ISO/IEC 19790:2020
Počet stran:85
Vydáno:2020-05-01
Status:Norma
DESCRIPTION

UNE EN ISO/IEC 19790:2020

This International Standard specifies the security requirements for a cryptographic module utilised within a security system protecting sensitive information in computer and telecommunication systems. This International Standard defines four security levels for cryptographic modules to provide for a wide spectrum of data sensitivity (e.g. low value administrative data, million dollar funds transfers, life protecting data, personal identity information, and sensitive information used by government) and a diversity of application environments (e.g. a guarded facility, an office, removable media, and a completely unprotected location). This International Standard specifies four security levels for each of 11 requirement areas with each security level increasing security over the preceding level. This International Standard specifies security requirements specified intended to maintain the security provided by a cryptographic module and compliance to this International Standard is not sufficient to ensure that a particular module is secure or that the security provided by the module is sufficient and acceptable to the owner of the information that is being protected.

Categories: