52
Библиография
- ISO/IEC Guide 611), General requirements for assessment and accreditation of certification/registration bodies
- ISO/IEC Guide 65, General requirements for bodies operating product certification systems
- ISO/IEC Guide 67, Conformity Assessment — Fundamentals of product certification
- ISO/IEC Guide 73, Risk Management— Vocabulary— Guidelines for use in standards
- ISO 9000, Quality management systems — Fundamentals and vocabulary
- ISO 9001, Quality management systems — Requirements
- ISO/IEC 13335-1, Information technology — Security techniques — Management of information and communications
technology security — Part 1: Concepts and models for information and communications technology security management
- ISO/IEC 15288, Systems and software engineering — System life cycle processes
- ISO/IEC 15408-1, Information technology—Security techniques — Evaluation criteria for IT security—Part 1:
Introduction and general model
- ISO/IEC 15408-2, Information technology—Security techniques — Evaluation criteria for IT security—Part 2:
Security functional requirements
- ISO/IEC 15408-3, Information technology—Security techniques — Evaluation criteria for IT security—Part 3:
Security assurance requirements
- ISO/IEC 18045, Information technology — Security techniques — Methodology for IT security evaluation
- ISO/IEC 17024, Conformity Assessment— General requirements for bodies operating certification of persons
- ISO/IEC 17025, General requirements forthe competence of testing and calibration laboratories
- ISO/IEC 19791, Information technology— Security techniques — Security assessment of operational systems
- ISO/IEC 19790, Information technology— Security techniques — Security requirements for cryptographic modules
- ISO/IEC 21827, Information technology—Security techniques—Systems Security Engineering — Capability
maturity model® (SSE-CMM®)
- ISO/IEC 27001, Information technology—Security techniques — Information security management systems —
Requirements
- ISO/IEC 27002, Information technology—Security techniques—Code of practice for information security
management
- ISO/IEC 27005, Information technology— Security techniques — Information security risk management
- CEN/CENELEC EN 45013: General criteria for certification bodies operating certification of personnel
- FIPS 140-1: Federal Information Processing Standard: Security Requirements for Cryptographic Modules, National Institute of Standards and Technology (NIST),http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf
- IT Grundschutz (Baseline Protection) Manual, Bundesamt für Sicherheit in der IT (BSI), 2004, http://www.bsi.bund.de/english/
- A Comparative Study of IT Security Criteria, Initiative D21, Initiative D21 e. V., Siemensdamm 50, 13629 Berlin, Germany
- A Guide to Certification and Accreditation for Information Technology Systems (MG-4), January 1996, CSE, The ITS Publications Section, (613) 991-7514/7468 or http://www.cse.dnd.ca
- A Guide To Risk Assessment and Safeguard Selection for Information Technology Systems, January 1996, CSE, The ITS Publications Section, (613) 991-7514/7468 or http://www.cse.dnd.ca
- COBIT MAPPING — Overview of International IT Guidance, IT Governance Institute, January 2004, IT Governance Institute, 3701 Algonquin Road, Suite 1010, Rolling Meadows, IL 60008, USA, (847) 590 7491 orhttp://www.itqi.org
- Fiona Pattinson, Comparing ISO 17799:2000 with SSE CMM V2, 2002,
http://www.cccure.orq//Documents/ISO17799/ISO17799 SSE CMM comparison.pdf
- Susanne Rohrig, Using Process Models To Analyse IT Security Requirements, Thesis, Faculty of Economics, University of Zurich, Switzerland, March 2003
11 Отменено и заменено на ISO/IEC 17011.