- 1 - X.ticsc. X.samtn. ICT Security Standards Roadmap Information security management guidelines for small and medium telecommunication organizations
|
|
- Anthony Carson
- 6 years ago
- Views:
Transcription
1 - 1 - Acknowledging the active involvement of SG17 editors and contributors to the development of SG17 deliverables in Study Period (8 17 September 2015) Abbie Barbir Alexey Koshka Bo Yu, Jie Yuan, Chen Zhang Byoung-Moon Chin, Vibha Tomar Cai Chen Chang Oh Kim, Wataru Senga Damir Rajnovic David Keller, Laura Prin X.TRsuss X.nessa X.ticsc X.samtn X.sgsm X.1521 (X.cvss) X.1341 (X.cmail) Z.161 Z Z Z Z Z Z.165 Z Z.166 Technical Report on the successful use of security standards Access control models for incidents exchange networks ITU-T X.1245 Supplement on Technical measures and mechanism on countering the spoofed call in the terminating network of VoLTE Security assessment techniques in telecommunication/ict networks ICT Security Standards Roadmap Information security management guidelines for small and medium telecommunication organizations Common vulnerability scoring system 3.0 Certified mail transport and certified post office protocols 3 core language 3 language extensions: Support of interfaces with continuous signals 3 language extensions: Configuration and deployment support 3 language extensions: Advanced parameterization 3 language extensions: Behaviour types 3 language extensions: Performance and real time testing 3 runtime interface (TRI) 3 extension package: Extended TRI 3 control interface (TCI) Z.168 Testing and Test Control Notation version 3: The IDL to TTCN-3 mapping Z.169 Testing and Test Control Notation version 3: Using XML schema with TTCN-3
2 - 2 - Z.161 Z Z Z Z Z Z.164 Z.165 Z Z.166 Z.167 Z.168 Z.169 Z.170 Eric Andersen, Michele Peiry X.pbact X.500 X.501 X.509 X.511 X core language 3 language extensions: Support of interfaces with continuous signals 3 language extensions: Configuration and deployment support 3 language extensions: Advanced parameterization 3 language extensions: Behaviour types 3 language extensions: Performance and real time testing 3 operational semantics 3 runtime interface (TRI) 3 extension package: Extended TRI 3 control interface (TCI) Testing and Test Control Notation version 3: Using ASN.1 with TTCN-3 Testing and Test Control Notation version 3: The IDL to TTCN-3 mapping Testing and Test Control Notation version 3: Using XML schema with TTCN-3 3 documentation comment specification Privacy-based access control in telebiometrics Interconnection The Directory: Overview of concepts, models and services Interconnection The Directory Models Interconnection The Directory Public-key and attribute certificate frameworks Interconnection The Directory Abstract service definition Interconnection The Directory Procedures for distributed operations
3 - 3 - Feng Gao, Laifu Wang,, Annan Zhu Gao Feng, Hirotaka Yoshida Hongwei Luo, Laifu Wang Hongwei Luo, Laifu Wang Huamin Jin, Shuai Wang, Hyoungshick Kim, JungSoo Park Hyungjin Lim, Jongyoul Park, Ik-Kyun Kim, Jong-Hyun Kim, Heung-Youl, Bo Yu X.519 X.520 X.521 X.525 X.pki-em X.pki-prof X.1247 (X.tfcmm) X.websec-6 X.tigsc X.iotsec-1 X.sgmvno X.tfcma X.cspim X.sdnsec-1 X.websec-7 X.simef X.sbb Interconnection The Directory Protocol specifications Interconnection The Directory Selected attribute types Interconnection The Directory Selected object classes Interconnection The Directory Replication Information technology Public-Key Infrastructure: Establishment and maintenance Information technology Public-Key Infrastructure: Profile Technical framework for countering mobile messaging spam Security framework and requirements for open capabilities of telecommunication services Technical implementation guidelines for ITU-T X.805 Simple encryption procedure for Internet of Things (IoT) environments ITU-T X.805 Supplement on Security guideline for mobile virtual network operator (MVNO) Technical framework for countering mobile inapplication advertising spam Technical requirements for countering instant messaging spam (SPIM) Security services using the Software-defined networking Reference monitor for online analytics services Session information message exchange format (SIMEF) Security capability requirements for countering smartphone-based botnets
4 - 4 - Jason Kim, Nak Hyun Kim, Yong Nyuo Shin Jean-Paul Lemaire Jun Seob Lee, Bo Yu, Kyeong Hee Oh, Wataru Senga Deawoo Park Jae-Nam Ko,, Seung-Woo Yu Min Zuo Masashi Eto, Koji Nakao Michael Harrop X.tam X.cms X.oiddev X.gsiiso X.msec-9 X.1051rev X.gcspi X.sup-gpim X.1256 (X.authi) X.itssec-1 X.TRSM6ed A guideline to technical and operational countermeasures for telebiometric applications using mobile devices Information technology Generic applications of ASN.1 Cryptographic Message Syntax (CMS) Information technology Use of object identifiers in the Internet of Things Guidelines on security of the individual information service for operators Functional security requirements and architecture for mobile phone anti-theft measures Information technology Security techniques Code of practice for Information security controls based on ISO/IEC for telecommunications organizations ITU-T X.1242 Supplement on Guideline for countermeasures against short message service (SMS) phishing incidents ITU-T X.gpim Supplement on Code of practice for personally identifiable information protection for telecommunications organizations Guidelines and framework for sharing network authentication results with service applications Secure software update capability for intelligent transportation system communications devices Technical Report Security in telecommunications and information technology An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications; 6 th edition Michele Peiry X.th2 Telebiometrics related to physics Michele Peiry X.th3 Telebiometrics related to chemistry Mijoo Kim, Jeong-Jun Suh, Mi Yeon Yoon Ming Feng, Jun Shen, Huirong Tian, Laifu Wang X.sgsec-1 X.1642 (X.goscc) Security functional architecture for smart grid services using telecommunication networks Guidelines for the operational security of cloud computing
5 - 5 - Myung Geun Chun, Jason Kim, Yong Nyuo Shin X.bhsm Information technology Security Techniques Telebiometric authentication framework using biometric hardware security module Nan Meng X.1601rev Security framework for cloud computing Nan Meng, Huirong Tian Olivier Vuillemin X.CSCDataSec X.th13 Guidelines for cloud service customer data security Holosphere to biosphere secure data acquisition and telecommunication protocol Paul Gerome X.th4 Telebiometrics related to biology Paul Gerome X.th5 Telebiometrics related to culturology Paul Gerome X.th6 Telebiometrics related to psychology Radu Marian Richard Anago, Anfana Traore X.1257 (X.iamt) X.sup-gisb Z.Imp100 Z.100 Z.101 Z.102 Z.103 Z.104 Z.105 Z.106 Z.107 Z.111 Z.100 Annex F1 Z.100 Annex F2 Identity and access management taxonomy ITU-T X.1054 Supplement on Best practice for implementation of Rec. ITU-T X.1054 ISO /IEC on governance of information security Case of Burkina Faso Specification and Description Language implementer's guide - Version of SDL-2010 Specification and Description Language - Basic SDL-2010 Specification and Description Language - Comprehensive SDL-2010 Specification and Description Language - Shorthand notation and annotation in SDL-2010 Specification and Description Language - Data and action language in SDL-2010 Specification and Description Language - SDL-2010 combined with ASN.1 modules Specification and Description Language - Common interchange format for SDL-2010 Specification and Description Language - Objectoriented data in SDL-2010 Notations and guidelines for the definition of ITU-T languages of SDL SDL formal definition: General overview of SDL SDL formal definition: Static semantics
6 - 6 - Z.100 Annex F3 Z.109 Z.151 Sandor Mazgon Sang-Woo Lee, Jae-Hoon Nah Sok Joon Lee Soonjoung Byun, Lijun Liu Tae Kyun Kim, Hyung-Jin Lim Tae Kyung Kim, Tae-Jin Lee, Jeong-Jun Suh Woong Go, Haeryong Park, Jeong-Jun Suh Xia Junjie, Heung-Youl Xuetao Du, Tao Lou Youki Kadobayashi Youki Kadobayashi Youki Kadobayashi, Daisuke Miyamoto Zhaoji Lin X.itssec-2 X.1155 (X.sap-5) X.gpim X.1157 (X.sap-7) X.eaaa X.gcsfmpd X.sgsec-2 X.iotsec-2 X.1246 (X.tivcs) X.1500 Amd.8 X.1500 Amd.9 X.cogent X.1314 Cor.1 of SDL SDL formal definition: Dynamic semantics Specification and Description Language - Unified modeling language profile for SDL-2010 User Requirements Notation (URN) - Language definition Security Compendia Security guidelines for V2X communication systems Guidelines on local linkable anonymous authentication for electronic services Information technology Security techniques Code of practice for Personally Identifiable Information protection Technical capabilities of fraud detection and response for services with high assurance level requirements Enhanced entity authentication based on aggregated attributes ITU-T X.1231 Supplement on guidance of countering spam for mobile phone developers Security guidelines for home area network (HAN) devices in smart grid systems Security framework for Internet of Things Technologies involved in countering voice spam in telecommunication organizations Overview of cybersecurity information exchange Amendment 8 Revised structured cybersecurity information exchange techniques Overview of cybersecurity information exchange Amendment 9 Revised structured cybersecurity information exchange techniques Design considerations for improved end-user perception of trustworthiness indicators Security requirements and framework of ubiquitous networking Corrigendum 1
7 - 7 - Dongya Wu Jae Hoon Nah Ruoni Wang, Peng Zhao Zhiyuan Hu, Min Shu, Ye Tao, Ni Zhang Zhiyuan Hu, Ye Tao X.oid-iot X.websec-8 X.1602 (X.sfcse) X.dsms X.sdnsec-2 ITU-T X.660 Supplement on Guidelines for using object identifiers for the Internet of Things Security protection guidelines for value-added services for telecommunication operator Security requirements for software as a service application environments Data security requirements for the monitoring service of cloud computing Security requirements and reference architecture for Software-Defined Networking
Editor(s) Contributors Acronym Title. Technical Report on the successful use of security standards. Abbie Barbir. Trust elevation protocol
- 1 - Acknowledging the active involvement of SG17 editors and contributors to the development of SG17 deliverables in Study Period 2013-2016 (14 23 March 2016) Abbie Barbir Abbie Barbir, Abbie Barbir,
More informationStudy Group 17 (Security) ITU Sector of Standardiza9on (ITU-T)
Study Group 17 (Security) ITU Sector of Standardiza9on (ITU-T) Vasily Dolmatov ITU-T Study Group 17 Overview Primary focus is to build confidence and security in the use of Informa6on and Communica6on
More informationITU-T SG 17 Achievements in ICT Security Standardization
ITU-T SG 17 Achievements in ICT Security Standardization Arkadiy Kremer (Chairman, ITU-T Study Group 17) kremer@rans.ru 6th ETSI SECURITY WORKSHOP, 19.01.2011 1/15 Topics ITU Plenipotentiary Conference
More informationPrivacy Security IdM Trust Observations from ITU T Study Group 17
Privacy Security IdM Trust Observations from ITU T Study Group 17 ETSI Security Week Security Workshop Session 3: Security in other Standards and Industry Forums Strategic overviews stress on Privacy work
More informationSecurity Standardization
ISO-ITU ITU Cooperation on Security Standardization Dr. Walter Fumy Chairman ISO/IEC JTC 1/SC 27 Chief Scientist, Bundesdruckerei GmbH, Germany 7th ETSI Security Workshop - Sophia Antipolis, January 2012
More informationIntroduction of ITU-T Study Group 17 Security for ITS perspective
Introduction of ITU-T Study Group 17 Security for ITS perspective (Primary focus in SG17 is to build confidence and security in the use of Information and Communication Technologies (ICTs)) July 29, 2015
More information5G security activities and future plan in ITU-T SG17
5G security activities and future plan in ITU-T SG17 Heung Youl Youm, PhD Chairman, ITU-T SG17 Professor, Soonchunhyang University, Korea(Rep. of) Content Strategic Vision for ITU-T SG17 Overview of 5G
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD This is a preview - click here to buy the full publication ISO/IEC 27017 First edition 2015-12-15 Information technology Security techniques Code of practice for information security
More informationSERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY. ITU-T X.660 Guidelines for using object identifiers for the Internet of things
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU Series X Supplement 31 (09/2017) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS
More informationITU-T Standardization on Countering Spam
Joint Internet Society, CITEL and ITU Workshop on Combating SPAM (Mendoza, Argentina, 7 October 2013) ITU-T Standardization on Countering Spam Sergio Scarabino Area Representative sergio.scarabino@itu.int
More informationInformation Security Management Systems Standards ISO/IEC Global Opportunity for the Business Community
Information Security Management Systems Standards ISO/IEC 27001 Global Opportunity for the Business Community Prof. Edward (Ted) Humphreys IPA Global Symposium 2013 23 rd May 2013, Tokyo, Japan CyberSecurity
More informationInformation technology Security techniques Telebiometric authentication framework using biometric hardware security module
INTERNATIONAL STANDARD ISO/IEC 17922 First edition 2017-09 Information technology Security techniques Telebiometric authentication framework using biometric hardware security module Technologies de l information
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 9594-8 Sixth edition 2008-12-15 Information technology Open Systems Interconnection The Directory: Publickey and attribute certificate frameworks Technologies de l'information
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD ISO/IEC 29151 First edition 2017-08 Information technology Security techniques Code of practice for personally identifiable information protection Technologies de l'information Techniques
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 9594-8 Fifth edition 2005-12-15 Information technology Open Systems Interconnection The Directory: Publickey and attribute certificate frameworks Technologies de l'information
More informationDeploying Access Control using Extended XACML in Open Web Service Environment
Deploying Access Control using Extended XACML in Open Web Service Environment Thirumaran.M Pondicherry Engg College Dhavachelvan.P Pondicherry University Divya.A Pondicherry Engg College ABSTRACT Now a
More informationS2-2 Activities in Focus Group on Smart Grid in ITU-T
TTC Workshop on EMC Standardization 2011 S2-2 Activities in Focus Group on Smart Grid in ITU-T Tsuyoshi Masuo NTT Energy and Environment Systems Laboratories 7 March 2011 1 What is Focus Group? Focus Group(FG)
More informationKey Security Issues for implementation of Digital Currency, including ITU-T SG17 activities
ITU Workshop on FG DFC Workshop on Standards for Digital Fiat Currency (DFC) () Key Issues for implementation of Digital Currency, including ITU-T SG17 activities Heung Youl Youm, PhD. Chairman of ITU-T
More informationINTERNATIONAL STANDARD
INTERNATIONAL STANDARD This is a preview - click here to buy the full publication ISO/IEC 9594-8 Eighth edition 2017-05 Information technology Open Systems Interconnection The Directory Part 8: frameworks
More information2008 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA 2008) Chengdu, China December 2008
2008 International Conference on Apperceiving Computing and Intelligence Analysis (ICACIA 2008) Chengdu, China 13-15 December 2008 IEEE Catalog Number: ISBN: CFP0881F-PRT 978-1-4244-3427-5 TABLE OF CONTENTS
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Open Systems Interconnection The Directory Part 5: Protocol specifications
INTERNATIONAL STANDARD ISO/IEC 9594-5 Seventh edition 2014-03-01 Information technology Open Systems Interconnection The Directory Part 5: Protocol specifications Technologies de l'information Interconnexion
More informationMASP Chapter on Safety and Security
MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 15945 First edition 2002-02-01 Information technology Security techniques Specification of TTP services to support the application of digital signatures Technologies de l'information
More informationSC27 WG4 Mission. Security controls and services
copyright ISO/IEC JTC 1/SC 27, 2012. This is an SC27 public document and is distributed as is for the sole purpose of awareness and promotion of SC 27 standards and so the text is not to be used for commercial
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 9594-8 Fourth edition 2001-08-01 Information technology Open Systems Interconnection The Directory: Public-key and attribute certificate frameworks Technologies de l'information
More informationITU-T Z.100. Specification and Description Language Overview of SDL-2010
International Telecommunication Union ITU-T Z.100 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (12/2011) SERIES Z: LANGUAGES AND GENERAL SOFTWARE ASPECTS FOR TELECOMMUNICATION SYSTEMS Formal description
More informationSERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Secure applications and services Security protocols
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T X.1159 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (11/2014) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD ISO/IEC 7816-15 Second edition 2016-05-15 Identification cards Integrated circuit cards Part 15: Cryptographic information application Cartes d identification Cartes à circuit intégré
More informationTelebiometrics, and applications in Japan. Systems Development Lab. Hitachi, Ltd.
Telebiometrics, and applications in Japan Yoshiaki ISOBE Systems Development Lab. Hitachi, Ltd. yoshiaki.isobe.en@hitachi.com 2 Introduction Biometrics i is one of Authentication ti ti technologies Authentication
More informationISO/IEC JTC 1/SC 27 N7769
ISO/IEC JTC 1/SC 27 N7769 REPLACES: N ISO/IEC JTC 1/SC 27 Information technology - Security techniques Secretariat: DIN, Germany DOC TYPE: officer's contribution TITLE: SC 27 Presentation to ITU-T Workshop
More informationPart 7: Selected object classes
INTERNATIONAL STANDARD ISO/IEC 9594-7 Eighth edition 2017-05 Information technology Open Systems Interconnection The Directory Part 7: Selected object classes Technologies de l information Interconnexion
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Open Systems Interconnection The Directory: Procedures for distributed operation
INTERNATIONAL STANDARD ISO/IEC 9594-4 Sixth edition 2008-12-15 Information technology Open Systems Interconnection The Directory: Procedures for distributed operation Technologies de l'information Interconnexion
More informationPart 5: Protocol specifications
INTERNATIONAL STANDARD ISO/IEC 9594-5 Eighth edition 2017-05 Information technology Open Systems Interconnection The Directory Part 5: Protocol specifications Technologies de l information Interconnexion
More informationCyber Security in ICT Networks: CITEL Perspectives
Cyber Security in ICT Networks: CITEL Perspectives Wayne Zeuch Rapporteur, Standards Coordination CITEL PCC.I OAS Hemispheric Workshop on Cyber Security Rio de Janeiro Brazil Nov 16-18 2009 ICT Networks
More informationISO/IEC INTERNATIONAL STANDARD. Information technology ASN.1 encoding rules: Mapping W3C XML schema definitions into ASN.1
INTERNATIONAL STANDARD ISO/IEC 8825-5 Third edition 2015-11-15 Information technology ASN.1 encoding rules: Mapping W3C XML schema definitions into ASN.1 Technologies de l'information Règles de codage
More informationB C ISO/IEC 9595 INTERNATIONAL STANDARD. Information technology Open Systems Interconnection Common management information service
INTERNATIONAL STANDARD ISO/IEC 9595 Third edition 1998-10-15 Information technology Open Systems Interconnection Common management information service Technologies de l'information Interconnexion de systèmes
More informationITU-T SG 17 Q10/17. Trust Elevation Frameworks
ITU-T SG 17 Q10/17 Trust Elevation Frameworks Abbie Barbir, Ph.D. ITU-T SG 17 Q10 Rapporteur Martin Euchner SG 17 Advisor ITU Workshop on "Future Trust and Knowledge Infrastructure July 1 2016 Contents
More informationThe Key Principles of Cyber Security for Connected and Automated Vehicles. Government
The Key Principles of Cyber Security for Connected and Automated Vehicles Government Contents Intelligent Transport System (ITS) & Connected and Automated Vehicle (CAV) System Security Principles: 1. Organisational
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Abstract Syntax Notation One (ASN.1): Specification of basic notation
INTERNATIONAL STANDARD ISO/IEC 8824-1 Fourth edition 2008-12-15 Information technology Abstract Syntax Notation One (ASN.1): Specification of basic notation Technologies de l'information Notation de syntaxe
More informationISO/IEC Information technology Open Systems Interconnection The Directory. Part 9: Replication
INTERNATIONAL STANDARD This is a preview - click here to buy the full publication ISO/IEC 9594-9 Seventh edition 2017-05 Information technology Open Systems Interconnection The Directory Part 9: Replication
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Message Handling Systems (MHS): MHS routing
INTERNATIONAL STANDARD ISO/IEC 10021-10 Second edition 1999-12-15 Information technology Message Handling Systems (MHS): MHS routing Technologies de l'information Systèmes de messagerie (MHS): Routage
More informationISO/IEC Information technology Open Systems Interconnection The Directory: Protocol specifications
This is a preview - click here to buy the full publication INTERNATIONAL STANDARD ISO/IEC 9594-5 Fifth edition 2005-12-15 Information technology Open Systems Interconnection The Directory: Protocol specifications
More informationTelematics Transport Gateway for Telematics Systems. Independent on Mobile Networks
Telematics Transport Gateway for Telematics Systems Independent on Mobile Networks Chul-Su Kim 1 *, Jongik Kim, Woo-Yong Han, and Oh-Cheon Kwon 1. Electronics and Telecommunications Research Institute,
More informationINTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 9594-7 Eighth edition 2017-05 Information technology Open Systems Interconnection The Directory Part 7: Selected object classes Technologies de l information Interconnexion
More informationA Compatible Public Service Platform for Multi-Electronic Certification Authority
Applied Mechanics and Materials Submitted: 2014-04-26 ISSN: 1662-7482, Vol. 610, pp 579-583 Accepted: 2014-05-26 doi:10.4028/www.scientific.net/amm.610.579 Online: 2014-08-11 2014 Trans Tech Publications,
More information[30] Dong J., Lou j. and Yu L. (2003), Improved entropy coding method, Doc. AVS Working Group (M1214), Beijing, Chaina. CHAPTER 4
[30] Dong J., Lou j. and Yu L. (3), Improved entropy coding method, Doc. AVS Working Group (M1214), Beijing, Chaina. CHAPTER 4 Algorithm for Implementation of nine Intra Prediction Modes in MATLAB and
More informationCollaboration System using Agent based on MRA in Cloud
Collaboration System using Agent based on MRA in Cloud Jong-Sub Lee*, Seok-Jae Moon** *Department of Information & Communication System, Semyeong University, Jecheon, Korea. ** Ingenium college of liberal
More informationISO/IEC JTC 1 Study Group on Smart Cities
ANSI WORKSHOP ISO/IEC JTC 1 Study Group on Smart Cities Presented by Alex Tarpinian Senior Manager, IBM ANSI WORKSHOP: Smart and Sustainable Cities November 21, 2013 1 Overview ISO/IEC JTC 1 Study Group
More informationConformity Assessment Schemes and Interoperability Testing (1) Keith Mainwaring ITU Telecommunication Standardization Bureau (TSB) Consultant
Conformity Assessment Schemes and Interoperability Testing (1) Keith Mainwaring ITU Standardization Bureau (TSB) Consultant Moscow, 9-11 november 2011 Contents The benefits of conformity assessment Conformity
More informationstandards and so the text is not to be used for commercial purposes, gain or as a source of profit. Any changes to the slides or incorporation in
ISO/IEC JTC 1/SC 27/WG 4 IT Security Controls and Services M. De Soete, ISO/IEC JTC 1 SC27 Vice Chair copyright ISO/IEC JTC 1/SC 27, 2014. This is an SC27 public document and is distributed as is for the
More informationDriving Internet of Things (IoT) standardization to build smart sustainable cities. Cristina Bueti, Adviser, ITU
Driving Internet of Things (IoT) standardization to build smart sustainable cities Cristina Bueti, Adviser, ITU The world is Mobile broadband penetration globally is reaching 47% in 2015, a value that
More informationCybersecurity Standards Coordination and Deployment Strategies: CITEL Initiatives
Cybersecurity Standards Coordination and Deployment Strategies: CITEL Initiatives Wayne Zeuch Rapporteur: Standards, Conformance, and Interoperability CITEL PCC.I ITU /CITEL Regional Cybersecurity Workshop
More informationISO/IEC JTC 1 N 13127
ISO/IEC JTC 1 N 13127 ISO/IEC JTC 1 Information technology Secretariat: ANSI (United States) Document type: Title: Status: Business Plan BUSINESS PLAN for JTC1/SC6, Telecommunications and Information Exchange
More informationITU-T Y Next generation network evolution phase 1 Overview
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T Y.2340 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (09/2016) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL
More informationCOMMON CRITERIA CERTIFICATION REPORT
COMMON CRITERIA CERTIFICATION REPORT Dell EMC Elastic Cloud Storage v3.2 15 May 2018 383-4-439 V1.0 Government of Canada. This document is the property of the Government of Canada. It shall not be altered,
More informationImplementation and Design of Security Configuration Check Toolkit for Classified Evaluation of Information System
National Conference on Information Technology and Computer Science (CITCS 2012) Implementation and Design of Security Configuration Check Toolkit for Classified Evaluation of Information System WANG Tian
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Abstract Syntax Notation One (ASN.1): Parameterization of ASN.
INTERNATIONAL STANDARD ISO/IEC 8824-4 Fifth edition 2015-11-15 Information technology Abstract Syntax Notation One (ASN.1): Parameterization of ASN.1 specifications Technologies de l'information Notation
More informationPKCS #10 v1.7: Certification Request Syntax Standard (Final draft)
PKCS #10 v1.7: Certification Request Syntax Standard (Final draft) RSA Laboratories May 4 th, 2000 Editor s note: This is the final draft of PKCS #10 v1.7, which is available for a 14-day public review
More informationISO/IEC Information technology Common Biometric Exchange Formats Framework Security block format specifications
INTERNATIONAL STANDARD ISO/IEC 19785-4 First edition 2010-08-15 Information technology Common Biometric Exchange Formats Framework Part 4: Security block format specifications Technologies de l'information
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Abstract Syntax Notation One (ASN.1): Information object specification
INTERNATIONAL STANDARD ISO/IEC 8824-2 Fifth edition 2015-11-15 Information technology Abstract Syntax Notation One (ASN.1): Information object specification Technologies de l'information Notation de syntaxe
More informationNational Institute of Standards and Technology
National Institute of Standards and Technology April 2017 1 ITL Mission ITL promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and related technology through
More informationISO/IEC This is a preview - click here to buy the full publication INTERNATIONAL STANDARD. Second edition
This is a preview - click here to buy the full publication INTERNATIONAL STANDARD ISO/IEC 9834-1 Second edition 2005-07-15 Information technology Open Systems Interconnection Procedures for the operation
More informationSecurity Standardization and Regulation An Industry Perspective
Security Standardization and Regulation An Industry Perspective Dr. Ralf Rammig Siemens AG Megatrends Challenges that are transforming our world Digitalization In the future, we ll be living in a world
More informationPart 5: Protocol specifications
INTERNATIONAL STANDARD ISO/IEC 9594-5 Eighth edition 2017-05 Information technology Open Systems Interconnection The Directory Part 5: Protocol specifications Technologies de l information Interconnexion
More informationAn Overview of ISO/IEC family of Information Security Management System Standards
What is ISO/IEC 27001? The ISO/IEC 27001 standard, published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), is known as Information
More informationStudy on the Quantitative Vulnerability Model of Information System based on Mathematical Modeling Techniques. Yunzhi Li
Applied Mechanics and Materials Submitted: 2014-08-05 ISSN: 1662-7482, Vols. 651-653, pp 1953-1957 Accepted: 2014-08-06 doi:10.4028/www.scientific.net/amm.651-653.1953 Online: 2014-09-30 2014 Trans Tech
More informationASN.1 and the Connected Vehicle
ASN.1 and the Connected Vehicle Alessandro Triglia sandro@oss.com OSS Nokalva, Inc. 2 nd International Summit on the State of the Connected Vehicle Troy, MI 2010-09-30 ASN.1 ASN.1 = Abstract Syntax Notation
More informationFeatured Articles II Security Research and Development Research and Development of Advanced Security Technology
364 Hitachi Review Vol. 65 (2016), No. 8 Featured Articles II Security Research and Development Research and Development of Advanced Security Technology Tadashi Kaji, Ph.D. OVERVIEW: The damage done by
More informationIT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)
Page 1 of 6 IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) I. Understanding the need for privacy in the IT environment A. Evolving
More informationIEEE Standards Activities in the Smart Grid Space (ICT Focus)
This document contains supplemental information referenced by the European Rolling Plan for ICT Standardisation IEEE Standards Activities in the Smart Grid Space (ICT Focus) Overview IEEE, through the
More informationInformation technology Security techniques Code of practice for personally identifiable information protection
INTERNATIONAL STANDARD ISO/IEC 29151 First edition 2017-08 Information technology Security techniques Code of practice for personally identifiable information protection Technologies de l'information Techniques
More informationCOMMON CRITERIA CERTIFICATION REPORT
COMMON CRITERIA CERTIFICATION REPORT EMC VPLEX v5.5 Version 1.0 11 May 2016 FOREWORD This certification report is an UNCLASSIFIED publication, issued under the authority of the Chief, Communications Security
More informationIEEE Standards Activities in the Smart Grid Space (ICT Focus) Overview
This document contains supplemental information referenced by the European Rolling Plan for ICT Standardisation. IEEE Standards Activities in the Smart Grid Space (ICT Focus) Overview IEEE s standardization
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 9594-10 Third edition 2005-12-15 Information technology Open Systems Interconnection The Directory: Use of systems management for administration of the Directory Technologies
More informationCOMMON CRITERIA CERTIFICATION REPORT
COMMON CRITERIA CERTIFICATION REPORT Ixia NTO 7303 and Vision ONE v4.5.0.29 30 October 2017 383-4-409 1.0 Government of Canada. This document is the property of the Government of Canada. It shall not be
More informationJohn Snare Chair Standards Australia Committee IT/12/4
John Snare Chair Standards Australia Committee IT/12/4 ISO/IEC 27001 ISMS Management perspective Risk Management (ISO 31000) Industry Specific Standards Banking, Health, Transport, Telecommunications ISO/IEC
More informationCOMMON CRITERIA CERTIFICATION REPORT
COMMON CRITERIA CERTIFICATION REPORT Dell Data Protection Encryption Personal Edition Version 8.14.0 383-4-416 2 October 2017 v1.1 Government of Canada. This document is the property of the Government
More informationEconomic and Social Council
United Nations Economic and Social Council ECE/TRANS/WP.29/2017/46 Distr.: General 23 December 2016 Original: English Economic Commission for Europe Inland Transport Committee World Forum for Harmonization
More informationCertification Report
Certification Report Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of Canada, Communications Security Establishment,
More informationCritical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level
Critical Information Infrastructure Protection Role of CIRTs and Cooperation at National Level 1 Global Cybersecurity Agenda (GCA) GCA is designed for cooperation and efficiency, encouraging collaboration
More informationCOMMON CRITERIA CERTIFICATION REPORT
COMMON CRITERIA CERTIFICATION REPORT CA Privileged Access Manager Version 2.5.5 v1.2 8 August 2016 FOREWORD This certification report is an UNCLASSIFIED publication, issued under the authority of the Chief,
More informationTECHNICAL STANDARDS ASSESSMENT REPORT
TECHNICAL STANDARDS ASSESSMENT REPORT 7/28/2018 Version 2.0, M. Ficken 1 Table of Contents 1 Table of Contents... 2 2 Scope... 3 2.1 ATMIA Next Gen Blueprint... 3 3 ASSESSMENT... 4 3.1 BIGGER PICTURE...
More informationSGS CYBER SECURITY GROWTH OPPORTUNITIES
SGS CYBER SECURITY GROWTH OPPORTUNITIES Eric Krzyzosiak GENERAL MANAGER DIGITAL Jeffrey Mc Donald Executive Vice President CERTIFICATION & BUSINESS ENHANCEMENT Eric Lee WIRELESS & CONSUMER RETAIL CYBER
More informationICNDS International Conference on Networking and Digital Society. Volume - 2. Table of Contents. ICNDS 2009 Volume 2
2009 International Conference on Networking and Digital Society ICNDS 2009 Table of Contents Volume - 2 Preface - Volume 2...x Organization - Volume 2...xi Reviewers - Volume 2...xii ICNDS 2009 Volume
More informationElectronic fee collection Information exchange between service provision and toll charging
Provläsningsexemplar / Preview INTERNATIONAL STANDARD ISO 12855 Second edition 2015-12-15 Electronic fee collection Information exchange between service provision and toll charging Perception du télépéage
More informationITU-T X.282. Superseded by a more recent version. Amendment 2 (12/97)
INTERNATIONAL TELECOMMUNICATION UNION ITU-T X.282 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU Amendment 2 (12/97) SERIES X: DATA NETWORKS AND OPEN SYSTEM COMMUNICATION Open System Interconnection Layer
More informationPredstavenie štandardu ISO/IEC 27005
PERFORMANCE & TECHNOLOGY - IT ADVISORY Predstavenie štandardu ISO/IEC 27005 ISMS Risk Management 16.02.2011 ADVISORY KPMG details KPMG is a global network of professional services firms providing audit,
More informationIT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)
Page 1 of 6 IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) I. Understanding the need for privacy in the IT environment A. Evolving
More informationSERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY OSI networking and system aspects Abstract Syntax Notation One (ASN.
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T X.680 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (08/2015) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY
More informationISO/IEC Information technology Open Systems Interconnection The Directory. Part 6: Selected attribute types
INTERNATIONAL STANDARD This is a preview - click here to buy the full publication ISO/IEC 9594-6 Eighth edition 2017-05 Information technology Open Systems Interconnection The Directory Part 6: Selected
More informationISC2 EXAM - CISSP. Certified Information Systems Security Professional. Buy Full Product.
ISC2 EXAM - CISSP Certified Information Systems Security Professional Buy Full Product http://www.examskey.com/cissp.html Examskey ISC2 CISSP exam demo product is here for you to test the quality of the
More informationResearch and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN
2016 International Conference on Wireless Communication and Network Engineering (WCNE 2016) ISBN: 978-1-60595-403-5 Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen
More informationCITEL s s Focus on Cybersecurity and Critical Infrastructure Protection CITEL
CITEL s s Focus on Cybersecurity and Critical Infrastructure Protection Wayne Zeuch CITEL (Alcatel-Lucent) ITU Regional Workshop on Frameworks for Cybersecurity and CIIP Buenos Aires, Argentina October
More informationAbstract. 1. Introduction
보안공학연구논문지 제 권제 호 년 월 Abstract In these days, many organizations try to manage their information system in safe way(i.e., Evaluation, Assurance and Certification of Information Security) due to more rapidly
More informationInformation technology MPEG systems technologies. Part 8: Coding-independent code points
INTERNATIONAL STANDARD ISO/IEC 23001-8 Second edition 2016-05-01 Information technology MPEG systems technologies Part 8: Coding-independent code points Technologies de l information Technologies des systèmes
More informationCOMMON CRITERIA CERTIFICATION REPORT
COMMON CRITERIA CERTIFICATION REPORT Dell EMC Unity OE 4.2 383-4-421 22 September 2017 Version 1.0 Government of Canada. This document is the property of the Government of Canada. It shall not be altered,
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD ISO/IEC 18013-3 Second edition 2017-04 Information technology Personal identification ISO-compliant driving licence Part 3: Access control, authentication and integrity validation
More informationWork and Projects in ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy technologies
Work and Projects in ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy technologies 30th Plenary meeting of the Consultative Committee of the Convention for the Protection of Individuals with Regard
More informationAuthentication Work stream FIGI Security Infrastructure and Trust Working Group. Abbie Barbir, Chair
Authentication Work stream FIGI Security Infrastructure and Trust Working Group Abbie Barbir, Chair Security, Infrastructure, Trust Working Group To enhance confidence in using Digital Financial Services
More informationCOMMON CRITERIA CERTIFICATION REPORT
COMMON CRITERIA CERTIFICATION REPORT EMC RecoverPoint v4.4 SP1 19 May 2016 FOREWORD This certification report is an UNCLASSIFIED publication, issued under the authority of the Chief, Communications Security
More information