UNLIMITED FREE
ACCESS
TO THE WORLD'S BEST IDEAS

SUBMIT
Already a GlobalSpec user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your GlobalSpec Experience

Finish!
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

ITU-T X.1500

Overview of cybersecurity information exchange

active, Most Current
Buy Now
Organization: ITU-T
Publication Date: 1 April 2011
Status: active
Page Count: 34
scope:

This Recommendation presents a cybersecurity information exchange (CYBEX) model and discusses techniques that can be used to facilitate the exchange of cybersecurity information. These techniques can be used individually or in combinations, as desired or appropriate, to enhance cybersecurity through coherent, comprehensive, global, timely and assured information exchange. No obligations to exchange information are implied, nor are the means of acquisition or ultimate use of the information treated. The techniques include the structured global discovery and interoperability of cybersecurity information in such a way as to allow for continual evolution to accommodate the significant activities and specification evolution occurring in numerous cybersecurity forums. CYBEX is one of the elements providing confidence and security in the use of ICTs.

This Recommendation has the following basic functions that can be used separately or together as appropriate:

• structuring cybersecurity information for exchange purposes;

• identifying and discovering cybersecurity information and entities;

• establishment of trust and policy agreement between exchanging entities;

• requesting and responding with cybersecurity information;

• assuring the integrity of the cybersecurity information exchange.

Subject to agreed policies and applicable laws and regulations, the means of acquiring information as well as the uses made of the information are specifically out of scope and not treated in this Recommendation. Some specific national and regional regulations and legislations may require implementation of mechanisms to protect personally identifiable information. Neither the techniques described in this Recommendation nor the exchange of related cybersecurity information are mandated by this Recommendation.

Document History

March 1, 2018
Overview of cybersecurity information exchange Amendment 12
A description is not available for this item.
March 1, 2017
Overview of cybersecurity information exchange Amendment 11: Revised structured cybersecurity information exchange techniques
A description is not available for this item.
September 1, 2016
Overview of cybersecurity information exchange Revised structured cybersecurity information exchange techniques
A description is not available for this item.
March 1, 2016
Overview of cybersecurity information exchange Amendment 9: Revised structured cybersecurity information exchange techniques
A description is not available for this item.
September 1, 2015
Overview of cybersecurity information exchange Amendment 8: Revised structured cybersecurity information exchange techniques
A description is not available for this item.
April 1, 2015
Overview of cybersecurity information exchange Amendment 7: Revised structured cybersecurity information exchange techniques
A description is not available for this item.
September 1, 2014
Overview of cybersecurity information exchange Amendment 6: Revised structured cybersecurity information exchange techniques
A description is not available for this item.
January 1, 2014
Overview of cybersecurity information exchange Amendment 5: Revised structured cybersecurity information exchange techniques
A description is not available for this item.
September 1, 2013
Overview of cybersecurity information exchange Amendment 4: Revised structured cybersecurity information exchange techniques
A description is not available for this item.
April 1, 2013
Overview of cybersecurity information exchange Amendment 3: Revised structured cybersecurity information exchange techniques
A description is not available for this item.
September 1, 2012
Overview of cybersecurity information exchange Amendment 2: Revised structured cybersecurity information exchange techniques
A description is not available for this item.
March 1, 2012
Overview of cybersecurity information exchange Amendment 1: Revised structured cybersecurity information exchange techniques
A description is not available for this item.
ITU-T X.1500
April 1, 2011
Overview of cybersecurity information exchange
This Recommendation presents a cybersecurity information exchange (CYBEX) model and discusses techniques that can be used to facilitate the exchange of cybersecurity information. These techniques can...

References

Advertisement