Skip to main content
Top

2022 | OriginalPaper | Chapter

5. Informations-/Cybersecurity-Standards

Author : Thomas Liedtke

Published in: Informationssicherheit

Publisher: Springer Berlin Heidelberg

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Zusammenfassung

Dieses Kapitel gibt einen Einblick in Standard lebenszyklusmodelle, die das Entwickeln sicherheitsgerichteter Produkte (im Sinne von Security) fördern. Ein Überblick über existierende Normen und Standards aus verschiedenen Domänen zeigt aus unterschiedlichen Blickwinkeln verfügbare Vorgaben und bewährte Stand-der-Technik Vorgehensweisen wie z.B. Secrutyby-Design auf.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
[ASPICE3.1]
go back to reference „Process Reference Model Process Assessment Model Version 3.1“; VDA Automotive SPICE® „Process Reference Model Process Assessment Model Version 3.1“; VDA Automotive SPICE®
[CMK+11]
go back to reference „Comprehensive Experimental Analyses of Automotive Attack Surfaces“; Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, and Stefan Savage University of California, San Diego; Karl Koscher, Alexei Czeskis, Franziska Roesner, and Tadayoshi Kohno University of Washington. Link: http://www.autosec.org/pubs/cars-usenixsec2011.pdf eingesehen: 18.04.2021 „Comprehensive Experimental Analyses of Automotive Attack Surfaces“; Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, and Stefan Savage University of California, San Diego; Karl Koscher, Alexei Czeskis, Franziska Roesner, and Tadayoshi Kohno University of Washington. Link: http://​www.​autosec.​org/​pubs/​cars-usenixsec2011.​pdf eingesehen: 18.04.2021
[DO-326]
go back to reference „Airworthiness Security Process Specification“; RTCA DO-326 „Airworthiness Security Process Specification“; RTCA DO-326
[HL06]
go back to reference „SDL: A Process for Developing Demonstrably More Secure Software“; Michael Howard; Steve Lipner; Microsoft, 2006; „SDL: A Process for Developing Demonstrably More Secure Software“; Michael Howard; Steve Lipner; Microsoft, 2006;
[ISO5112]
go back to reference „Road vehicles – Guidelines for auditing cybersecurity engineering“, ISO PAS 5112 „Road vehicles – Guidelines for auditing cybersecurity engineering“, ISO PAS 5112
[ISO15288]
go back to reference „Systems and software engineering — System life cycle processes“; ISO/IEC/IEEE15288 „Systems and software engineering — System life cycle processes“; ISO/IEC/IEEE15288
[ISO15408]
go back to reference „Information technology – Security techniques – Evaluation criteria for IT security –“, Common Criteria, ISO/IEC 15408 Band 1 – 3 „Information technology – Security techniques – Evaluation criteria for IT security –“, Common Criteria, ISO/IEC 15408 Band 1 – 3
[ISO21434]
go back to reference „Road Vehicles – Cybersecurity Engineering”, International Standard ISO/ SAE 21434. „Road Vehicles – Cybersecurity Engineering”, International Standard ISO/ SAE 21434.
[ISO27001]
go back to reference „Information security management systems – Requirements“; ISO/IEC 27001 „Information security management systems – Requirements“; ISO/IEC 27001
[ISO27002]
go back to reference „Information technology — Security techniques — Code of practice for information security controls“; ISO/IEC 27002 „Information technology — Security techniques — Code of practice for information security controls“; ISO/IEC 27002
[ISO27005]
go back to reference „Information technology – Security techniques - Information security risk management“; ISO/IEC 27005 „Information technology – Security techniques - Information security risk management“; ISO/IEC 27005
[ISO27701]
go back to reference „Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management — Requirements and guidelines“; ISO/IEC 27701 „Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management — Requirements and guidelines“; ISO/IEC 27701
[ISO29100]
go back to reference „Information Technology – Security techniques – Privacy framework“; ISO/IEC 29100:2011(E); First edition 2011–12–15. „Information Technology – Security techniques – Privacy framework“; ISO/IEC 29100:2011(E); First edition 2011–12–15.
[ISO31000]
go back to reference „Risk management – Guidelines“; DIN ISO 31000 „Risk management – Guidelines“; DIN ISO 31000
[NIST800-115]
go back to reference „Technical Guide to Information Security Testing and Assessment“; NIST SP 800–115 „Technical Guide to Information Security Testing and Assessment“; NIST SP 800–115
[NIST800-160v1]
go back to reference „Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems“, NIST SP 800–160 volume 1 (2016) „Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems“, NIST SP 800–160 volume 1 (2016)
[NIST800-160v2]
go back to reference „Developing Cyber Resilien Systems: A Systems Security Engineering Approach“; NIST SP 800-160v2 (2019) „Developing Cyber Resilien Systems: A Systems Security Engineering Approach“; NIST SP 800-160v2 (2019)
[SAE3061]
go back to reference „Cybersecurity Guidebook for Cyber-Physical Vehicle Systems“; SAE J3061TM,, Issued 2016–01 Cybersecurity Guidebook for Cyber-Physical Vehicle Systems“; SAE J3061TM,, Issued 2016–01
[VDA21]
go back to reference „Automotive SPICE® for Cybersecurity“, VDA Yellow Book, February 2021 „Automotive SPICE® for Cybersecurity“, VDA Yellow Book, February 2021
Metadata
Title
Informations-/Cybersecurity-Standards
Author
Thomas Liedtke
Copyright Year
2022
Publisher
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-662-63917-7_5

Premium Partner