UNLIMITED FREE
ACCESS
TO THE WORLD'S BEST IDEAS

SUBMIT
Already a GlobalSpec user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your GlobalSpec Experience

Finish!
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

ITU-T X.1205

Overview of cybersecurity

active, Most Current
Buy Now
Organization: ITU-T
Publication Date: 1 April 2008
Status: active
Page Count: 64
scope:

This Recommendation develops a definition of cybersecurity in clause 7. This Recommendation provides a taxonomy of security threats from an organization point of view.

NOTE - The use of the term "identity" in this Recommendation does not indicate its absolute meaning. In particular, it does not constitute any positive validation.

Clause 7 discusses the nature of enterprise cybersecurity environment, cybersecurity risks and endto- end communications security. Clause 8 discusses possible network protection strategies, including: closed loop policy management, uniform access management. Clause 8 also discusses secure communications techniques, variable depth security, securing the management plane, layered security and network survivability even under attack.

Appendix I discusses taxonomy of security threats, hackers tools of the trade and security threats.

Appendix II provides a review of the fields of cybersecurity technologies, including: cryptograph, access control technologies, perimeter protection techniques, antivirus and system integrity, audit and monitoring, and management.

Appendix III provides examples of network security. Examples include: securing remote access, securing IP telephony, securing VoIP clients, securing the remote office and securing WLANs.

Document History

ITU-T X.1205
April 1, 2008
Overview of cybersecurity
This Recommendation develops a definition of cybersecurity in clause 7. This Recommendation provides a taxonomy of security threats from an organization point of view. NOTE – The use of the term...

References

Advertisement