ZH

RU

ES

global threat

global threat, Total:58 items.

In the international standard classification, global threat involves: Telecommunication systems, Applications of information technology, Character sets and information coding, Information technology (IT) in general, Mobile services, Open systems interconnection (OSI), Protection against fire.


US-DOT, global threat

GB-REG, global threat

Group Standards of the People's Republic of China, global threat

  • T/CCSA 229-2018 Cloud computing security threats and requirements
  • T/GDCSA 012-2022 Regulations for security inspection of important information system terminals against advanced persistent threats

Association Francaise de Normalisation, global threat

European Telecommunications Standards Institute (ETSI), global threat

  • ETSI TR 103 743-2021 CYBER; Home Gateway Security Threat Analysis (V1.1.1)
  • ETSI GR QSC 004-2017 Quantum-Safe Cryptography; Quantum-Safe threat assessment (V1.1.1)
  • ETSI TS 121 133-2000 Universal Mobile Telecommunications System (UMTS); 3G Security; Security Threats and Requirements 3G TS 21.133 Version 3.1.0 Release 1999
  • ETSI TS 121 133-2001 Universal Mobile Telecommunications System (UMTS); 3G Security; Security Threats and Requirements (3G TS 21.133 Version 3.2.0 Release 1999)
  • ETSI TR 102 893-2017 Intelligent Transport Systems (ITS); Security; Threat@ Vulnerability and Risk Analysis (TVRA) (V1.2.1)
  • ETSI TR 102 893-2010 Intelligent Transport Systems (ITS); Security; Threat, Vulnerability and Risk Analysis (TVRA) (V1.1.1)
  • ETSI TR 103 087-2016 Reconfigurable Radio Systems (RRS); Security related use cases and threats in Reconfigurable Radio Systems (V1.1.1)
  • ETSI 3G TS 21.133-1999 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Security Threats and Requirements
  • ETSI TR 133926 V 16.4.0,3GPP TR 33.926 Version 16. LTE - Security Assurance Specification (SCAS) threats and critical assets in 3GPP network product classes (3GPP TR 33.926 version 16.4.0 Release 16)
  • ETSI TR 187 002-2006 Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); TISPAN NGN Security (NGN_SEC); Threat and Risk Analysis V1.1.1
  • ETSI TR 187 002-2008 Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); TISPAN NGN Security (NGN_SEC); Threat, Vulnerability and Risk Analysis V1.2.2

ETSI - European Telecommunications Standards Institute, global threat

  • GR QSC 004-2017 Quantum-Safe Cryptography; Quantum-Safe threat assessment (V1.1.1)
  • TR 103 087-2017 Reconfigurable Radio Systems (RRS); Security related use cases and threats (V1.2.1)
  • TS 121 133-2001 Universal Mobile Telecommunications System (UMTS); 3G Security; Security Threats and Requirements (3G TS 21.133 Version 3.2.0 Release 1999)
  • TS 121 133-2000 Universal Mobile Telecommunications System (UMTS); 3G Security; Security Threats and Requirements (3G TS 21.133 Version 3.1.0 Release 1999)
  • 3G TS 21.133-1999 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Security Threats and Requirements (V3.0.0)
  • TR 103 087-2016 Reconfigurable Radio Systems (RRS); Security related use cases and threats in Reconfigurable Radio Systems (V1.1.1)
  • TR 187 002-2006 Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); TISPAN NGN Security (NGN_SEC); Threat and Risk Analysis (V1.1.1)
  • TR 133 926-2018 LTE; Security Assurance Specification (SCAS) threats and critical assets in 3GPP network product classes (V15.1.0; 3GPP TR 33.926 version 15.1.0 Release 15)
  • TR 133 926-2017 LTE; Security Assurance Specification (SCAS) threats and critical assets in 3GPP network product classes (V14.0.0; 3GPP TR 33.926 version 14.0.0 Release 14)
  • TR 133 926-2016 LTE; Security Assurance Specification (SCAS) threats and critical assets in 3GPP network product classes (V13.0.0; 3GPP TR 33.926 version 13.0.0 Release 13)
  • TS 102 165-1-2003 Telecommunications and Internet Protocol Harmonization Over Networks (TIPHON) Release 4; Protocol Framework Definition; Methods and Protocols for Security; Part 1: Threat Analysis (V4.1.1)

General Administration of Quality Supervision, Inspection and Quarantine of the People‘s Republic of China, global threat

  • GB/T 42708-2023 Guidance on Sharing Information on Financial Cybersecurity Threats
  • GB/T 31499-2015 Information security technology.Technical requirements and testing and evaluation approaches for unified threat management products
  • GB/T 25068.3-2022 Information technology—Security techniques—Network security—Part 3: Threats, design techniques and control for network access scenarios

国家市场监督管理总局、中国国家标准化管理委员会, global threat

  • GB/T 36643-2018 Information security technology—Cyber security threat information format

SAE - SAE International, global threat

ITU-T - International Telecommunication Union/ITU Telcommunication Sector, global threat

  • ITU-T K.115-2015 Mitigation methods against electromagnetic security threats (Study Group 5)
  • SERIES X SUPP 17-2012 ITU-T X.1143 – Supplement on threats and security objectives for enhanced web-based telecommunication services (Study Group 17)

Professional Standard - Post and Telecommunication, global threat

GOSTR, global threat

  • GOST R 58412-2019 Information protection. Secure software development. Software development life cycle threats
  • GOST R 22.3.17-2020 Safety in emergencies. Planning of measures for evacuation and dispersal of the population in case of a threat and occurrence of emergency situations. Fundamentals

International Telecommunication Union (ITU), global threat

  • ITU-T X.1406-2021 Security threats to online voting systems using distributed ledger technology
  • ITU-T X.1405-2021 Security threats and requirements for digital payment services based on distributed ledger technology
  • ITU-T X SUPP 17-2012 ITU-T X.1143 - Supplement on threats and security objectives for enhanced web-based telecommunication services
  • ITU-T SERIES X SUPP 17-2012 ITU-T X.1143 – Supplement on threats and security objectives for enhanced web-based telecommunication services (Study Group 17)

Jiangsu Provincial Standard of the People's Republic of China, global threat

  • DB3205/T 1043-2022 Digital government city network security threat flow monitoring data management specification

BELST, global threat

  • STB 2335-2013 Nuclear power plants. Safety. Method of threat analysis and estimation of safety violation risks of nuclear power plant computer systems
  • STB 34.101.72-2018 Information technology. Security techniques. Information processing technical means. Threat classification in the presence of malicious hardware and undeclared functions

British Standards Institution (BSI), global threat

  • BS ISO/IEC 27033-3:2011 Information technology. Security techniques. Network security. Reference networking scenarios. Threats, design techniques and control issues
  • BS ISO/IEC 27033-3:2010 Information technology. Security techniques. Network security - Reference networking scenarios. Threats, design techniques and control issues

工业和信息化部, global threat

  • YD/T 3458-2019 Technical requirements for secure operation of Internet number resource public key infrastructure (RPKI) data security threat model

Korean Agency for Technology and Standards (KATS), global threat

Danish Standards Foundation, global threat

  • DS/ISO/IEC 27033-3:2011 Information technology - Security techniques - Network security - Part 3: Reference networking scenarios - Threats, design techniques and control issues

International Organization for Standardization (ISO), global threat

  • ISO/IEC 27033-3:2010 Information technology - Security techniques - Network security - Part 3: Reference networking scenarios - Threats, design techniques and control issues
  • ISO/CD TS 23782 Guidance on the requirement for large-scale test methods to represent fire threats in different full-scale fire scenarios

RU-GOST R, global threat

  • GOST R ISO/IEC 27033-3-2014 Information technology. Security techniques. Network security. Part 3. Reference networking scenarios. Threats, design techniques and control issues
  • GOST R 53113.1-2008 Information technology. Protection of information technology and automated systems against security threats posed by use of covert channels. Part 1. General principles

KR-KS, global threat

  • KS X ISO/IEC 27033-3-2012(2022) Information technology-Security techniques-Network security-Part 3:Reference networking scenarios-Threats, design techniques and control issues

NATO - North Atlantic Treaty Organization, global threat

  • AOP-4797-2019 SAFETY REQUIREMENTS FOR HAZARD MITIGATION DEVICES (HMD) EMPLOYED TO ADDRESS FAST/SLOW HEATING THREATS TO MUNITIONS (ED A; Ver. 1)




Copyright ©2007-2023 ANTPEDIA, All Rights Reserved