{"id":451466,"date":"2024-10-20T09:17:58","date_gmt":"2024-10-20T09:17:58","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iso-iec-15408-42023\/"},"modified":"2024-10-26T17:20:13","modified_gmt":"2024-10-26T17:20:13","slug":"bs-en-iso-iec-15408-42023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iso-iec-15408-42023\/","title":{"rendered":"BS EN ISO\/IEC 15408-4:2023"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 4.1 Concepts and model <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4.2 Deriving evaluation methods and evaluation activities <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 4.3 Verb usage in the description of evaluation methods and evaluation activities <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 4.4 Conventions for the description of evaluation methods and evaluation activities 5.1 Overview <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.2 Specification of an evaluation method 5.2.1 Overview <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.2.2 Identification of evaluation methods <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5.2.3 Entity responsible for the evaluation method 5.2.4 Scope of the evaluation method 5.2.5 Dependencies 5.2.6 Required input from the developer or other entities <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 5.2.7 Required tool types 5.2.8 Required evaluator competences 5.2.9 Requirements for reporting 5.2.10 Rationale for the evaluation method <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 5.2.11 Additional verb definitions 5.2.12 Set of evaluation activities 6.1 Overview 6.2 Specification of an evaluation activity 6.2.1 Unique identification of the evaluation activity 6.2.2 Objective of the evaluation activity <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 6.2.3 Evaluation activity links to SFRs, SARs, and other evaluation activities 6.2.4 Required input from the developer or other entities 6.2.5 Required tool types 6.2.6 Required evaluator competences 6.2.7 Assessment strategy <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 6.2.8 Pass\/fail criteria <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 6.2.9 Requirements for reporting 6.2.10 Rationale for the evaluation activity <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information security, cybersecurity and privacy protection. Evaluation criteria for IT security – Framework for the specification of evaluation methods and activities<\/b><\/p>\n |