UNLIMITED FREE
ACCESS
TO THE WORLD'S BEST IDEAS

SUBMIT
Already a GlobalSpec user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your GlobalSpec Experience

Finish!
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

- Trained on our vast library of engineering resources.

ITU-T X.1051

Information technology – Security techniques – Information security management guidelines for telecommunications organizations based on ISO/IEC 27002

inactive
Buy Now
Organization: ITU-T
Publication Date: 1 February 2008
Status: inactive
Page Count: 54

Document History

June 1, 2023
(Pre-Published) Information security, cybersecurity and privacy protection - Information security controls based on ISO/IEC 27002 for telecommunications organizations
The scope of this Recommendation | International Standard is to provide guidelines supporting the implementation of information security controls in telecommunications organizations. The adoption of...
September 1, 2017
Information technology – Security techniques – Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations Technical Corrigendum 1
A description is not available for this item.
April 1, 2016
Information technology – Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for telecommunications organizations
The scope of this Recommendation | International Standard is to define guidelines supporting the implementation of information security controls in telecommunications organizations. The adoption of...
ITU-T X.1051
February 1, 2008
Information technology – Security techniques – Information security management guidelines for telecommunications organizations based on ISO/IEC 27002
A description is not available for this item.
July 1, 2004
Information Security Management System – Requirements for Telecommunications (ISMS-T) SERIES X: DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS Telecommunication security
A description is not available for this item.

References

Advertisement