SP-024 IT Security Competence

advertisement
IT Security Competence
Purpose
This document is used as a competence declaration to get a picture of the person’s background,
knowledge and experience in the fields of
 IT security evaluation
 IT security in general
 Other relevant areas
It is to be used by those who are aiming to have an active role in the Scheme, e.g. evaluators,
certifiers, external experts, sub-contractors, etc. It will establish the base for further interviews with the
applicants.
Feel free to add rows to the form tables as necessary. Relevant information not provided for in the
forms may be written in.
024 IT Security Competence - Form 11.0
Please send the form to:
FMV/CSEC
SE-115 88 Stockholm
SWEDISH COMMON CRITERIA EVALUATION AND CERTIFICATION SCHEME
IT Security Competence
General Information
Role applied for
 Evaluator
 Technical expert during evaluation
 Other (please specify)____________________
Applicant
Name
E-Mail
Mobile Phone
Company/Organisation
Telephone
Education
Examination
Institute
Dates
Institute
Dates
Education
Examination
Education
Certificates, etc.
Certificate
Institute
Dates
Certificate
Institute
Dates
Certificate
Institute
Dates
Employment history
Date
Company
Title/Task
Date
Company
Title/Task
Date
Company
024 IT Security Competence - Form 11.0
Title/Task
Date
Company
Title/Task
SWEDISH COMMON CRITERIA EVALUATION AND CERTIFICATION SCHEME
IT Security Competence
024 IT Security Competence - Form 11.0
Main Areas of Competence
SWEDISH COMMON CRITERIA EVALUATION AND CERTIFICATION SCHEME
IT Security Competence
IT Security Competence
Explanation to the form tables below:
Duration: The time in weeks, months or years spent in the area.
The listed application areas are examples, other relevant areas may be added as needed.
Application areas:
Area
Cryptography/cryptology
PKI
Smart Cards
Operating systems
Description, examples
Cryptographical protocols, key management, algorithms
Electronic signatures, certificates, applications
Internal design, Writing applications, CA operation
User experience, administrating skills, kernel and sub-system development
Protocols, routers, firewalls, IDS
Protocols, equipment
Protocols, equipment
Network
Telecom
Wireless
Competence areas:
Area
Theoretical
System design
Description, examples
Security principles, formal models, algorithms
High level design, abstract modelling, object orientation, structured
approach
Low level design, coding techniques, programming languages, platforms
Methodology, equipment, functional testing, penetration test
Installation, hard- and software
Planning, writing policies
Threats-vulnerabilities-security measures
CC/CEM, ITSEC/ITSEM, other
Implementation
Test and verification
Operation and maintenance
Management of IT-systems
Security analysis
Evaluation
Cryptography/Cryptology
Theoretical
System
design
Implementation
Test &
Ver
Oper. &
Maint.
IT-Syst
Mgm
Security
analysis
Evaluation
Other
Duration
Project Description
Project Description
024 IT Security Competence - Form 11.0
Project Description
SWEDISH COMMON CRITERIA EVALUATION AND CERTIFICATION SCHEME
IT Security Competence
PKI
Theoretical
System
design
Implementation
Test &
Ver
Oper. &
Maint.
IT-Syst
Mgm
Security
analysis
Evaluation
Other
System
design
Implementation
Test &
Ver
Oper. &
Maint.
IT-Syst
Mgm
Security
analysis
Evaluation
Other
Implementation
Test &
Ver
Oper. &
Maint.
IT-Syst
Mgm
Security
analysis
Evaluation
Other
Duration
Project Description
Project Description
Project Description
Smart Cards
Theoretical
Duration
Project Description
Project Description
Project Description
Operating Systems
Theoretical
System
design
Duration
Project Description
Project Description
024 IT Security Competence - Form 11.0
Project Description
SWEDISH COMMON CRITERIA EVALUATION AND CERTIFICATION SCHEME
IT Security Competence
Network
Theoretical
System
design
Implementation
Test &
Ver
Oper. &
Maint.
IT-Syst
Mgm
Security
analysis
Evaluation
Other
System
design
Implementation
Test &
Ver
Oper. &
Maint.
IT-Syst
Mgm
Security
analysis
Evaluation
Other
System
design
Implementation
Test &
Ver
Oper. &
Maint.
IT-Syst
Mgm
Security
analysis
Evaluation
Other
Duration
Project Description
Project Description
Project Description
Telecom
Theoretical
Duration
Project Description
Project Description
Project Description
Wireless
Theoretical
Duration
Project Description
Project Description
024 IT Security Competence - Form 11.0
Project Description
SWEDISH COMMON CRITERIA EVALUATION AND CERTIFICATION SCHEME
IT Security Competence
Other (specify)
Theoretical
System
design
Implementation
Test &
Ver
Oper. &
Maint.
IT-Syst
Mgm
Security
analysis
Evaluation
Other
Duration
Project Description
Project Description
Project Description
IT Security Evaluation Experience
Target of Evaluation
Method
Sponsor/Developer
Dates
Description of Work
Target of Evaluation
Method
Sponsor/Developer
Dates
Description of Work
Target of Evaluation
Method
Sponsor/Developer
Dates
024 IT Security Competence - Form 11.0
Description of Work
SWEDISH COMMON CRITERIA EVALUATION AND CERTIFICATION SCHEME
Download