X.1205-2008

Overview of cybersecurity (Study Group 17)


 

 

非常抱歉,我们暂时无法提供预览,您可以试试: 免费下载 X.1205-2008 前三页,或者稍后再访问。

如果您需要购买此标准的全文,请联系:

点击下载后,生成下载文件时间比较长,请耐心等待......

 

标准号
X.1205-2008
发布日期
2008年04月01日
实施日期
2009年12月03日
废止日期
中国标准分类号
/
国际标准分类号
/
发布单位
ITU-T - International Telecommunication Union/ITU Telcommunication Sector
引用标准
64
适用范围
"This Recommendation develops a definition of cybersecurity in clause 7. This Recommendation provides a taxonomy of security threats from an organization point of view. NOTE ?C The use of the term ""identity"" in this Recommendation does not indicate its absolute meaning. In particular@ it does not constitute any positive validation. Clause 7 discusses the nature of enterprise cybersecurity environment@ cybersecurity risks and endto- end communications security. Clause 8 discusses possible network protection strategies@ including: closed loop policy management@ uniform access management. Clause 8 also discusses secure communications techniques@ variable depth security@ securing the management plane@ layered security and network survivability even under attack. Appendix I discusses taxonomy of security threats@ hackers tools of the trade and security threats. Appendix II provides a review of the fields of cybersecurity technologies@ including: cryptograph@ access control technologies@ perimeter protection techniques@ antivirus and system integrity@ audit and monitoring@ and management. Appendix III provides examples of network security. Examples include: securing remote access@ securing IP telephony@ securing VoIP clients@ securing the remote office and securing WLANs."




Copyright ©2007-2022 ANTPEDIA, All Rights Reserved
京ICP备07018254号 京公网安备1101085018 电信与信息服务业务经营许可证:京ICP证110310号