ETSI SR 002 298-2003 Response from CEN and ETSI to the Communication from the Commission to the Council the European Parliament the European Economic and Social Committee and the .pdf

上传人:jobexamine331 文档编号:734968 上传时间:2019-01-12 格式:PDF 页数:75 大小:367.37KB
下载 相关 举报
ETSI SR 002 298-2003 Response from CEN and ETSI to the  Communication from the Commission to the Council the European Parliament the European Economic and Social Committee and the .pdf_第1页
第1页 / 共75页
ETSI SR 002 298-2003 Response from CEN and ETSI to the  Communication from the Commission to the Council the European Parliament the European Economic and Social Committee and the .pdf_第2页
第2页 / 共75页
ETSI SR 002 298-2003 Response from CEN and ETSI to the  Communication from the Commission to the Council the European Parliament the European Economic and Social Committee and the .pdf_第3页
第3页 / 共75页
ETSI SR 002 298-2003 Response from CEN and ETSI to the  Communication from the Commission to the Council the European Parliament the European Economic and Social Committee and the .pdf_第4页
第4页 / 共75页
ETSI SR 002 298-2003 Response from CEN and ETSI to the  Communication from the Commission to the Council the European Parliament the European Economic and Social Committee and the .pdf_第5页
第5页 / 共75页
点击查看更多>>
资源描述

1、 ETSI SR 002 298 V1.1.1 (2003-12)Special Report Response from CEN and ETSI to the“Communication from the Commission to the Council,the European Parliament, the European Economic andSocial Committee and the Committee of the Regions:Network and Information Security:Proposal for a European Policy Appro

2、ach“ETSI ETSI SR 002 298 V1.1.1 (2003-12) 2 Reference DSR/BOARD-00004 Keywords security ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture d

3、e Grasse (06) N 7803/88 Important notice Individual copies of the present document can be downloaded from: http:/www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions,

4、 the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revisi

5、on or change of status. Information on the current status of this and other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, send your comment to: editoretsi.org Copyright Notification No part may be reproduced except as authorized

6、 by written permission. The copyright and the foregoing restriction extend to reproduction in all media. European Telecommunications Standards Institute 2003. All rights reserved. DECTTM, PLUGTESTSTM and UMTSTM are Trade Marks of ETSI registered for the benefit of its Members. TIPHONTMand the TIPHON

7、 logo are Trade Marks currently being registered by ETSI for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. ETSI ETSI SR 002 298 V1.1.1 (2003-12) 3 Contents Intellectual Property Rights7 Foreword.7 1 Scope

8、 8 2 References 8 3 Definitions and abbreviations.9 3.1 Definitions9 3.2 Abbreviations .9 4 Introduction 10 5 Network and information security11 5.1 Definition used in the present document 11 5.2 Other “real world“ issues not covered 12 5.2.1 Legal issues.12 5.2.2 Vetting of personnel12 5.2.3 Inform

9、ation security professional qualifications.12 5.2.4 Longevity of archiving12 6 Electronic business and other contexts.13 7 The structure of the present document .13 8 CEN and ETSI response to proposed actions.14 8.1 Awareness raising.14 8.2 Technology support14 8.3 Support for market oriented standa

10、rdization and certification .14 8.3.1 Interoperability .14 8.3.2 EU initiatives 15 8.3.3 Certification and accreditation15 8.3.4 Participation in standardization activities .15 8.3.5 Stimulation of standardization activities.16 8.3.6 Proposed European Network and Information Security Agency16 8.4 In

11、ternational co-operation 16 9 User requirements 16 9.1 Home users.16 9.1.1 Home working 16 9.1.2 Personal business 17 9.1.3 Microprocessor control of domestic equipment17 9.1.4 General security requirements 17 9.2 Small and medium enterprises18 9.2.1 The SME as a user of e-business services.18 9.2.2

12、 The SME as a supplier of e-business services 18 9.2.3 General security requirements 18 9.3 Large organizations and industries.19 9.3.1 General security requirements 19 9.4 Recommendations 19 10 General threats to network and information security .20 11 Registration and authentication services 21 11

13、.1 Security measures.22 11.1.1 Effective user registration.22 11.1.2 Effective user identification and authentication22 11.1.3 Effective access control 22 11.1.4 Effective user management.22 11.2 Passwords.22 11.3 Biometrics 23 ETSI ETSI SR 002 298 V1.1.1 (2003-12) 4 11.4 Digital certificates 23 11.

14、5 Smart cards.23 11.6 Recommendations 24 11.6.1 Registration.24 11.6.2 Authentication.24 11.6.3 Interoperability and framework considerations 24 11.6.4 Biometrics.24 11.6.5 Other mechanisms 25 12 Confidentiality and privacy services 25 12.1 Security measures.25 12.2 Encryption of stored information

15、.26 12.3 Electronic mail encryption .26 12.4 Network encryption26 12.5 Cryptographic algorithms.27 12.6 Object re-use policy27 12.7 Recommendations 28 12.7.1 Encryption of stored information28 12.7.2 Network and electronic mail encryption.28 12.7.3 Object re-use policy28 13 Trust services28 13.1 Sec

16、urity measures.28 13.1.1 Key management 29 13.1.2 Non-repudiation29 13.1.3 Evidence of receipt .29 13.1.4 Trusted commitment service.30 13.1.5 Integrity 30 13.2 Electronic signatures 30 13.3 Hash functions31 13.4 Time-stamping .31 13.5 Non-repudiation .31 13.6 Public Key Infrastructures (PKI)31 13.7

17、 Harmonization of trust services32 13.8 Recommendations 32 14 Business services32 14.1 Security measures.33 14.1.1 Service availability .33 14.1.2 Information availability 33 14.1.3 Effective accounting and audit33 14.2 Failure impact analysis.34 14.3 Capacity planning.34 14.4 Business continuity pl

18、anning34 14.5 Configuration management 34 14.6 Checksums and cyclic redundancy checks.34 14.7 Recommendations 34 15 Network defence services.35 15.1 Security measures.35 15.1.1 Preventative measures.35 15.1.2 Detection measures.35 15.2 Recommendations 35 16 Assurance services .36 16.1 Security measu

19、res.36 16.2 Risk assessment36 16.3 Evaluation.37 16.4 Certification37 16.5 Information security management standards37 16.6 Accreditation bodies.38 16.7 Recommendations 38 Annex A: Standards for registration and authentication services.39 ETSI ETSI SR 002 298 V1.1.1 (2003-12) 5 A.1 General authentic

20、ation standards39 A.1.1 International Organization for Standardization and Electrotechnical Commission (ISO/IEC) 39 A.1.2 European Telecommunications and Standards Institute (ETSI).39 A.1.3 US National Institute of Standards and Technology 41 A.1.4 Internet Engineering Task Force (IETF) 41 A.1.5 Ins

21、titute of Electrical Engineers .42 A.2 Passwords.42 A.2.1 Internet Engineering Task Force (IETF) 42 A.2.2 US National Institute of Standards and Technology 42 A.2.3 US National Computer Centre42 A.3 Biometrics 42 A.3.1 International Organization for Standardization and Electrotechnical Commission (I

22、SO/IEC) 42 A.3.2 ANSI/NIST.43 A.3.3 Other Organizations/Activities.43 A.4 Digital certificates 43 A.4.1 International Organization for Standardization and Electrotechnical Commission (ISO/IEC) 43 A.4.2 European Standards Committee (CEN)44 A.4.3 European Telecommunications and Standards Institute (ET

23、SI).44 A.4.4 Internet Engineering Task Force (IETF) 44 A.4.5 ANSI 44 A.4.6 US National Institute of Standards and Technology 44 A.4.7 RSA Public Key Cryptography Standards44 A.5 Smart Cards45 A.5.1 International Organization for Standardization and Electrotechnical Commission (ISO/IEC) 45 A.5.2 Euro

24、pean Standards Committee - Information Society Standardization System (CEN/ISSS).45 A.5.3 European Telecommunications and Standards Institute (ETSI).48 A.5.4 Personal Computer Smart Card Workgroup.51 A.5.5 Smart Card alliance 51 A.5.6 e-Europe Smart Card (eESC) Initiative 51 A.5.6 US National Instit

25、ute of Standards and Technology.54 A.5.7 RSA Public key Cryptography Standards.54 A.5.8 Internet Engineering Task Force.54 Annex B: Standards for Confidentiality and privacy services.55 B.1 Encryption 55 B.1.1 Organization for Economic Co-operation and Development (OECD).55 B.1.2 International Organ

26、ization for Standardization and Electrotechnical Commission (ISO/IEC) 55 B.1.3 European Telecommunications Standards Institute (ETSI)56 B.1.4 Internet Engineering Task Force (IETF) 58 B.1.5 American National Standards Institute.58 B.1.6 US National Institute of Standards and Technology.58 B.1.7 RSA

27、Public Key Cryptography Standards59 B.2 Public Key Infrastructure .59 Annex C: Standards for Trust Services .60 C.1 Electronic signatures 60 C.1.1 International Organization for Standardization and Electrotechnical Commission (ISO/IEC) 60 C.1.2 European Standards Committee- Information Society Stand

28、ardization System (CEN/ISSS)60 C.1.3 European Telecommunications Standards Institute (ETSI)61 C.1.4 International Telegraph and Telephone Consultative Committee (CCITT) of the International Telecommunications Union (ITU) .61 C.1.5 Internet Engineering Task Force (IETF) 62 C.1.6 RSA - Public Key Cryp

29、tography Standards .62 C.1.7 American National Standards Institute.62 C.1.8 US National Institute of Standards and Technology 62 C.2 Public Key Infrastructure .62 C.2.1 International Organization for Standardization and Electrotechnical Commission (ISO/IEC) 62 ETSI ETSI SR 002 298 V1.1.1 (2003-12) 6

30、 C.2.2 European Telecommunications Standards Institute (ETSI)62 C.2.3 US National Institute of Standards and Technology 62 C.2.4 Internet Engineering Task Force (IETF) 62 C.3 Hash functions63 C.3.1 International Organization for Standardization and Electrotechnical Commission (ISO/IEC) 63 C.3.2 Inte

31、rnet Engineering Task Force (IETF) 63 C.3.3 American National Standards Institute.63 C.3.4 US National Institute of Standards and Technology 64 C.4 Time-stamping .64 C.4.1 International Organization for Standardization and Electrotechnical Commission (ISO/IEC) 64 C.4.2 European Standards Committee-

32、Information Society Standardization System (CEN/ISSS)64 C.4.3 European Telecommunications Standards Institute (ETSI)64 C.5 Non-repudiation .64 C.5.1 International Organization for Standardization and Electrotechnical Commission (ISO/IEC) 64 C.6 Key management65 C.6.1 International Organization for S

33、tandardization and Electrotechnical Commission (ISO/IEC) 65 Annex D: Standards for Business Services 66 Annex E: Standards for Network Defence Services67 E.1 Anti-virus .67 E.1.1 US National Institute of Standards and Technology 67 E.2 Firewalls.67 E.2.1 International Organization for Standardizatio

34、n and Electrotechnical Commission (ISO/IEC) 67 E.2.2 Internet Engineering Task Force 67 E.2.3 US National Institute of Standards and Technology 67 E.3 Intrusion detection68 E.3.1 International Organization for Standardization and Electrotechnical Commission (ISO/IEC) 68 E.3.2 US National Institute o

35、f Standards and Technology 68 E.4 General Network Security68 E.4.1 International Organization for Standardization and Electrotechnical Commission (ISO/IEC) 68 Annex F: Standards for Assurance services69 F.1 Information security management and risk assessment .69 F.2 Accreditation and certification .

36、70 F.2.1 European Committee for Standardization (CEN) and International Organization for Standardization and Electrotechnical Commission (ISO/IEC) .70 F.3 Evaluation.72 F.3.1 International Organization for Standardization and Electrotechnical Commission (ISO/IEC) and European Committee for Standardi

37、zation (CEN).72 F.3.2 US National Institute of Standards and Technology 73 F.3.3 US National Computer Security Centre .73 F.3.4 US National Computer Security Centre .73 Annex G: Standards for Microprocessor Control of Domestic Equipment74 G.1 International Organization for Standardization and Electr

38、otechnical Commission (ISO/IEC)74 G.2 Other work74 History 75 ETSI ETSI SR 002 298 V1.1.1 (2003-12) 7 Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly a

39、vailable for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web s

40、erver (http:/webapp.etsi.org/IPR/home.asp). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may

41、 be, or may become, essential to the present document. Foreword This Special Report (SR) has been produced by a joint CEN-ETSI Network and Information Security standardization group in response to the European Commissions call for “a comprehensive strategy on security of electronic networks includin

42、g practical implementing action“. CEN and ETSI share the aims set forward in the Communication from the Commission. It is agreed that there are comprehensive standards available for secure electronic networks. However, the report notes that there are few security frameworks to guarantee multi-vendor

43、 systems will operate securely together. Also it is noted that there is a lack of appropriate certification in some areas. The result is fragmentation and uneven implementation in real networks and insecurities remain despite some parts being very secure. In support of the Commissions aims, certain

44、key issues are central to the reports recommendations: Interoperability: There are many security standards available. This often leads to problems of interoperability - with potentially annoying consequences for the consumer and perhaps business consequences for the provider of electronic services.

45、A number of mechanisms exist to improve this situation including the use of standards frameworks which can help to identify and incorporate interoperable standards in such a way that users become unaware of interoperability issues. Also interoperability testing can help to ensure equipment conformin

46、g to standards and frameworks does really interoperate. The reports recommendations encourage interoperability testing and the incorporation of “overlapping“ standards within suitable frameworks which unify as far as possible the different technical means of doing certain tasks. Upgradeability: Secu

47、rity is not a static problem: the implementation of a standard in a product may need to be updated as weaknesses are discovered; and new standards will be needed whenever existing ones become ineffective in countering threats to security. Several of the reports recommendations are aimed at ensuring

48、this need is recognized and dealt with in a manner that is as simple as possible for the end user, through the use of frameworks that can handle updates in a transparent manner. Home users and Small and Medium Enterprises: In the near future it is very clear that many home users and many Small and M

49、edium Enterprises will be making new, permanent connections to the Internet for the purposes of e-commerce, information and entertainment. These users will naturally have neither the expertise nor the inclination to apply obscure security measures to consistently prevent security breaches. The report makes recommendations to deal with this issue before it becomes a major problem. It is hoped that the awareness of these issues generated within the European Standards Organizations will encourage the development of high quality security standards and frameworks in close

展开阅读全文
相关资源
猜你喜欢
  • EN ISO 8968-5-2001 en Milk - Determination of Nitrogen Content - Part 5 Determination of Protein-Nitrogen Content《牛奶含氮量的测定 第5部分 蛋白质氮含量的测定 ISO 8968-5-2001》.pdf EN ISO 8968-5-2001 en Milk - Determination of Nitrogen Content - Part 5 Determination of Protein-Nitrogen Content《牛奶含氮量的测定 第5部分 蛋白质氮含量的测定 ISO 8968-5-2001》.pdf
  • EN ISO 8970-2010 en Timber structures - Testing of joints made with mechanical fasteners - Requirements for wood density《木结构 机械紧固件接头试验 木材密度要求[代替 CEN EN 28970]》.pdf EN ISO 8970-2010 en Timber structures - Testing of joints made with mechanical fasteners - Requirements for wood density《木结构 机械紧固件接头试验 木材密度要求[代替 CEN EN 28970]》.pdf
  • EN ISO 8974-2002 en Plastics - Phenolic Resins - Determination of Residual Phenol Content by Gas Chromatography《塑料 酚醛树脂 用气体色谱法测定残余酚含量 ISO 8974-2002》.pdf EN ISO 8974-2002 en Plastics - Phenolic Resins - Determination of Residual Phenol Content by Gas Chromatography《塑料 酚醛树脂 用气体色谱法测定残余酚含量 ISO 8974-2002》.pdf
  • EN ISO 8975-1995 en Plastics - Phenolic Resins - Determination of pH《塑料 酚醛树脂 pH值的测定(ISO 8975-1989)》.pdf EN ISO 8975-1995 en Plastics - Phenolic Resins - Determination of pH《塑料 酚醛树脂 pH值的测定(ISO 8975-1989)》.pdf
  • EN ISO 898-1-2013 en Mechanical properties of fasteners made of carbon steel and alloy steel - Part 1 Bolts screws and studs with specified property classes - Coarse thread and fin.pdf EN ISO 898-1-2013 en Mechanical properties of fasteners made of carbon steel and alloy steel - Part 1 Bolts screws and studs with specified property classes - Coarse thread and fin.pdf
  • EN ISO 898-2-2012 en Mechanical properties of fasteners made of carbon steel and alloy steel - Part 2 Nuts with specified property classes - Coarse thread and fine pitch thread《碳素钢.pdf EN ISO 898-2-2012 en Mechanical properties of fasteners made of carbon steel and alloy steel - Part 2 Nuts with specified property classes - Coarse thread and fine pitch thread《碳素钢.pdf
  • EN ISO 898-3-2018 en Mechanical properties of fasteners made of carbon steel and alloy steel - Part 3 Flat washers with specified property classes.pdf EN ISO 898-3-2018 en Mechanical properties of fasteners made of carbon steel and alloy steel - Part 3 Flat washers with specified property classes.pdf
  • EN ISO 898-5-2012 en Mechanical properties of fasteners made of carbon steel and alloy steel - Part 5 Set screws and similar threaded fasteners with specified hardness classes - Co.pdf EN ISO 898-5-2012 en Mechanical properties of fasteners made of carbon steel and alloy steel - Part 5 Set screws and similar threaded fasteners with specified hardness classes - Co.pdf
  • EN ISO 8980-1-2004 en Ophthalmic optics - Uncut finished spectacle lenses - Part 1 Specifications for single-vision and multifocal lenses (Incorporating Corrigendum September 2006).pdf EN ISO 8980-1-2004 en Ophthalmic optics - Uncut finished spectacle lenses - Part 1 Specifications for single-vision and multifocal lenses (Incorporating Corrigendum September 2006).pdf
  • 相关搜索

    当前位置:首页 > 标准规范 > 国际标准 > 其他

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1